☆68Aug 1, 2017Updated 8 years ago
Alternatives and similar repositories for defcon-workshop
Users that are interested in defcon-workshop are comparing it to the libraries listed below
Sorting:
- This repo contains a collection of scripts to help with checks for SSL☆17Nov 6, 2022Updated 3 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- An extreme bootcamp to enable teams to build DevSecOps into their environment.☆10Jan 16, 2017Updated 9 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- Security aspects of AWS products for the Security Specialist certification☆211May 12, 2022Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Apr 8, 2020Updated 5 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Apr 22, 2017Updated 8 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Scapy hands-on at #GreHack17☆17Nov 14, 2017Updated 8 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 8 years ago