derrumbe / Spartacus-as-a-ServiceLinks
Node based express app to ensure privacy online through obfuscation.
☆17Updated 3 years ago
Alternatives and similar repositories for Spartacus-as-a-Service
Users that are interested in Spartacus-as-a-Service are comparing it to the libraries listed below
Sorting:
- I wrote a book about privacy and OPSEC, so here it is.☆66Updated 6 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆262Updated 2 months ago
- Status: summoned and unleashed upon DEF CON 26☆24Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆36Updated 6 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 3 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 6 years ago
- DEF CON Hacker Tracker☆110Updated 3 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- ☆143Updated 6 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Red Team Resources☆60Updated 7 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- Rogue AP killer☆91Updated 8 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 6 months ago
- A tool for processing a lot of pcaps using tshark☆155Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 6 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Updated 6 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- This is a WIP. Here be dragons.☆12Updated 6 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆121Updated 3 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- Forensics acquisition framework designed to be extensible and secure☆125Updated 6 years ago