cryptax / confsec
Security, hacking conferences (list)
☆519Updated last week
Alternatives and similar repositories for confsec:
Users that are interested in confsec are comparing it to the libraries listed below
- The Damn Vulnerable Router Firmware Project☆684Updated 3 years ago
- Kinda useful notes collated together publicly☆491Updated 5 years ago
- ☆606Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆1,108Updated last year
- PwnWiki - The notes section of the pentesters mind.☆560Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆233Updated 3 weeks ago
- Interview questions to screen offensive (red team/pentest) candidates☆879Updated 6 years ago
- Some security related notes☆459Updated 7 years ago
- CTFs, solutions and presentations☆287Updated 2 weeks ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,180Updated 4 years ago
- Collaborative malware analysis framework☆375Updated 6 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- Modern tactical exploitation toolkit.☆842Updated 8 months ago
- A Course on Intermediate Level Linux Exploitation☆996Updated 4 years ago
- Damn Vulnerable IoT Device☆200Updated last year
- A collection of sources of indicators of compromise.☆841Updated 5 months ago
- Documentation for the Mechanical Phish.☆234Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 4 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,039Updated 3 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆838Updated last month
- Slide decks from my conference presentations☆363Updated last year
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆273Updated 4 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆741Updated 3 months ago
- Red Team Tactics, Techniques, and Procedures☆398Updated last month
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- the Network Protocol Fuzzer that we will want to use.☆748Updated last year
- Vulnerability examples.☆403Updated 10 months ago
- Attify OS - Distro for pentesting IoT devices☆974Updated 3 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆401Updated last year
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 7 years ago