cse-cst / spartacusLinks
☆49Updated 6 years ago
Alternatives and similar repositories for spartacus
Users that are interested in spartacus are comparing it to the libraries listed below
Sorting:
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated last week
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆708Updated 8 years ago
- ☆13Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆260Updated 9 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- ☆44Updated 8 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- Cyber Security Challenge Australia 2015 Files☆38Updated 8 years ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Updated 8 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- random brain dumps☆349Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Introbackdoors☆50Updated 8 years ago
- Common Findings Database☆101Updated 6 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 9 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- The Hacker's Sandbox☆123Updated 3 months ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 6 years ago