DefconParrot / DefconArsenalToolsLinks
A curation of tools presented at DEF CON conference each year, the world's largest hacker con.
☆40Updated last week
Alternatives and similar repositories for DefconArsenalTools
Users that are interested in DefconArsenalTools are comparing it to the libraries listed below
Sorting:
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆106Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆162Updated this week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆88Updated 3 months ago
- ☆135Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 6 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Regular Expressions List used in Digital Forensic Tasks☆89Updated 6 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆83Updated last month
- ☆65Updated 2 years ago
- ☆40Updated 8 months ago
- Knowledge base on cybercriminal concealment techniques☆76Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 3 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- ☆55Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- ☆13Updated 2 years ago
- List of Command&Control (C2) software☆42Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago