Kybr-git / DC30-Badge-Challenge-WriteupLinks
Writeup for the DEF CON 30 badge challenge
☆72Updated 2 years ago
Alternatives and similar repositories for DC30-Badge-Challenge-Writeup
Users that are interested in DC30-Badge-Challenge-Writeup are comparing it to the libraries listed below
Sorting:
- ☆74Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- The DC801 Badge Platform for DC28+☆58Updated last month
- A repo to support the book☆108Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- ☆27Updated last year
- ☆135Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆143Updated 2 years ago
- ☆28Updated 9 months ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- SANS Holiday Hack Challenge write-up template☆16Updated last year
- ☆54Updated 4 years ago
- ☆144Updated 10 months ago
- It records your screenshots and code, then lets you upload to ASHIRT☆55Updated 4 months ago
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆15Updated last year
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- A curated checklist of tasks to be done during engagements☆32Updated 9 months ago
- Advanced: Bluetooth low energy capture the flag☆58Updated last year
- All my slides for any talks☆23Updated 8 months ago
- DEFCON 32 Badge Game☆59Updated 10 months ago
- Make your swine run like it's Divine☆10Updated 3 months ago
- Statically Compiled Tools that could be used in engagements☆17Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- ☆21Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year