DefconParrot / DefconArsenalToolsLinks
A curation of tools presented at DEF CON conference each year, the world's largest hacker con.
☆43Updated 4 months ago
Alternatives and similar repositories for DefconArsenalTools
Users that are interested in DefconArsenalTools are comparing it to the libraries listed below
Sorting:
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 11 months ago
- ☆65Updated 2 years ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆103Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 8 months ago
- A collection of tools that I use in CTF's or for assessments☆106Updated 11 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- List of Command&Control (C2) software☆46Updated 3 years ago
- A repository with informtion related to Cloud Osint☆109Updated 9 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆216Updated 3 years ago
- Deny list generator for password filters☆26Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆170Updated 4 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆220Updated 8 months ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆106Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆243Updated 11 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆66Updated 9 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- ☆55Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆227Updated 9 months ago
- ☆132Updated 2 years ago