☆36Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for defcon28
Users that are interested in defcon28 are comparing it to the libraries listed below
Sorting:
- ☆16Oct 3, 2018Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Simple proto parser with a gui☆19Jan 15, 2021Updated 5 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- posting example☆15May 11, 2020Updated 5 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆21May 3, 2019Updated 6 years ago
- Sample project for kernel debugging automation with Vagrant☆60Apr 11, 2020Updated 5 years ago
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- INTEL PIN dbi based process tracer☆19Jun 25, 2020Updated 5 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- ☆15Oct 20, 2019Updated 6 years ago
- Some app to activate WA using SMS, multiplatform and with GUI☆32Mar 23, 2015Updated 10 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- CTF solve scripts. Some writeups on my blog, others on my gist. Check the challenge directories for links.☆10Feb 3, 2024Updated 2 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- vasilisk☆19Dec 23, 2019Updated 6 years ago
- ☆24Dec 22, 2020Updated 5 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Chrome App that talks to Android host-based card emulation application.☆11Nov 21, 2014Updated 11 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Example Project For On Screen Keyboard☆11Feb 11, 2017Updated 9 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- The pattern matching swiss knife☆16Oct 28, 2019Updated 6 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago