All related files and slides for past talks
☆44Dec 14, 2025Updated 5 months ago
Alternatives and similar repositories for Publications
Users that are interested in Publications are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆13Aug 1, 2017Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆23May 20, 2016Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Apr 1, 2023Updated 3 years ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 9 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- ☆39Mar 31, 2021Updated 5 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 7 years ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Aug 19, 2017Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 9 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 8 years ago
- Playground for testing feedback☆16Aug 12, 2020Updated 5 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆14Sep 11, 2021Updated 4 years ago
- UAC 0day, all day!☆280Jul 30, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 9 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago