d1str0 / dc29-badgeLinks
☆74Updated 3 years ago
Alternatives and similar repositories for dc29-badge
Users that are interested in dc29-badge are comparing it to the libraries listed below
Sorting:
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 4 months ago
- The DC801 Badge Platform for DC28+☆58Updated 2 months ago
- ☆232Updated 5 years ago
- Do funny things with your DEF CON 29 badge.☆16Updated 3 years ago
- ☆20Updated 2 years ago
- ☆145Updated 11 months ago
- ☆21Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆28Updated 11 months ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 3 months ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated 10 months ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 2 weeks ago
- All my slides for any talks☆23Updated 9 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- ☆16Updated 6 months ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- ☆54Updated 4 years ago
- ☆36Updated last year
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- Scoring Engine for Red/White/Blue Team Competitions☆129Updated this week
- This will be a wiki when it grows up, if it grows up☆93Updated last year
- Statically Compiled Tools that could be used in engagements☆17Updated 2 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- ☆28Updated 2 years ago
- ☆134Updated 4 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆479Updated 5 years ago