My Quick Note of BlackHat 2015 Arsenal
☆26Aug 13, 2015Updated 10 years ago
Alternatives and similar repositories for BlackHat2015Arsenal
Users that are interested in BlackHat2015Arsenal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- ☆18Jul 30, 2024Updated last year
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- ☆16Apr 16, 2015Updated 11 years ago
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆12May 5, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teaching☆16Mar 4, 2018Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆80Apr 17, 2017Updated 9 years ago
- PacketSled's Bro AMQP Writer Plugin☆11Aug 5, 2016Updated 9 years ago
- Software, firmware and hardware designs for Ubertooth☆19Aug 30, 2015Updated 10 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Aug 8, 2015Updated 10 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago
- ☆12Apr 22, 2022Updated 4 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- SNES for MiSTer☆16Sep 5, 2025Updated 8 months ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆39Apr 24, 2019Updated 7 years ago
- ☆12Feb 4, 2019Updated 7 years ago
- A VIM plugin to make life feasible in the presence of space-hippies.☆21Jul 31, 2019Updated 6 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago