cse-cst / spartacus
☆49Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for spartacus
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- Passive History Scanner written in Python☆10Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Store Burp data and collaborate via git☆54Updated 5 years ago
- Threatbutt Suite☆36Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22Updated 8 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 8 years ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14Updated 5 years ago
- Threatbutt python client and Maltego transforms☆49Updated 4 months ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆84Updated 7 years ago
- ☆47Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- Collection of metasploit modules☆66Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago