Kybr-git / DC30-Badge-Challenge-WriteupLinks
Writeup for the DEF CON 30 badge challenge
☆71Updated 3 years ago
Alternatives and similar repositories for DC30-Badge-Challenge-Writeup
Users that are interested in DC30-Badge-Challenge-Writeup are comparing it to the libraries listed below
Sorting:
- ☆73Updated 4 years ago
- The DC801 Badge Platform for DC28+☆58Updated last week
- A memorial site for Hackers and Infosec people who have passed☆137Updated 3 weeks ago
- ☆148Updated last year
- ☆133Updated 4 years ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 2 months ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 4 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- This repository is for the vagrant instances of VulnHub machines☆47Updated last year
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- ☆36Updated 2 years ago
- Statically Compiled Tools that could be used in engagements☆17Updated 3 years ago
- Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
- OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
- ☆28Updated 2 years ago
- Collection of useful Canary tools☆91Updated 2 months ago
- A repo to support the book☆109Updated 4 years ago
- This will be a wiki when it grows up, if it grows up☆95Updated 2 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- ☆19Updated 2 years ago
- Knowledge base on cybercriminal concealment techniques☆78Updated 5 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Open Threat Hunting Framework☆120Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 3 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆48Updated 2 weeks ago
- Intrusion Detection Honeypots Book Code☆25Updated 5 years ago