Hacking-and-Coffee / defcon-for-n00bs
DEF CON for N00bs is an open guide for first time attendees to the convention.
☆45Updated 7 years ago
Alternatives and similar repositories for defcon-for-n00bs
Users that are interested in defcon-for-n00bs are comparing it to the libraries listed below
Sorting:
- CTF website frontend for SecGen☆21Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆57Updated 4 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Bash script to install Honeypot projects ona Raspbian System☆28Updated 9 years ago
- Binary exploitation CTF challenge☆24Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Metasploit Framework☆25Updated 7 years ago
- Hacking challenges☆31Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- ☆61Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- ☆25Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆198Updated 9 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 10 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago