codetojoy / talk_maritimedevcon_groovy
Demo code for talk at Maritime DevCon 2016.
☆14Updated 8 years ago
Alternatives and similar repositories for talk_maritimedevcon_groovy:
Users that are interested in talk_maritimedevcon_groovy are comparing it to the libraries listed below
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- A blog describing general hardware and software reverse engineering.☆17Updated last year
- USB testing framework☆15Updated last year
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11Updated last year
- An ongoing collection of java language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical…☆20Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated last year
- An intentionally-vulnerable web application, ported from https://github.com/jzheaux/terracotta-bank-spring☆38Updated 2 years ago
- Wordlist attacks on Bitwarden data.json files☆47Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- OWASP Zed Attack Proxy (ZAP) Maven plugin☆17Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆26Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆54Updated last year
- ☆16Updated last year
- Write-Ups for TryHackMe☆23Updated 3 years ago
- A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.☆71Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆8Updated 3 years ago
- A dataset of global salaries in InfoSec/Cybersecurity.☆18Updated this week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Various Geb examples from blog posts on qualityshepherd.com☆17Updated 10 years ago
- A deliberately insecure voter database☆31Updated 3 months ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Corrupted files generator. Random bits flipper.☆22Updated last year
- A curated list of awesome Java frameworks, libraries, software and books☆183Updated last year
- Everything Application Security☆27Updated 3 months ago
- Repository for Geb's issue tracker☆12Updated 7 years ago