cktben / dc24_badgeLinks
New firmware for the DEFCON 24 badge
☆8Updated 8 years ago
Alternatives and similar repositories for dc24_badge
Users that are interested in dc24_badge are comparing it to the libraries listed below
Sorting:
- ☆25Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- ☆48Updated 9 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 10 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- aiki.go source code and analysis☆15Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- Some helper tools for network pentest☆19Updated 11 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 8 years ago
- A ton of helpful tools☆39Updated 3 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago