☆68Aug 1, 2017Updated 8 years ago
Alternatives and similar repositories for defcon-workshop
Users that are interested in defcon-workshop are comparing it to the libraries listed below
Sorting:
- This repo contains a collection of scripts to help with checks for SSL☆17Nov 6, 2022Updated 3 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- An extreme bootcamp to enable teams to build DevSecOps into their environment.☆10Jan 16, 2017Updated 9 years ago
- A open contribute bootcamp to develop DevSecOps skills...☆782Sep 18, 2023Updated 2 years ago
- Prevents you from committing secrets and credentials into git repositories☆21Jun 27, 2017Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Nov 24, 2016Updated 9 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Apr 22, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Security aspects of AWS products for the Security Specialist certification☆211May 12, 2022Updated 3 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Apr 8, 2020Updated 5 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- Scapy hands-on at #GreHack17☆17Nov 14, 2017Updated 8 years ago
- An AWS cross-account tool to support human access with MFA for the CLI and GUI.☆19Oct 16, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Forecast is a big data environment for understanding security anomalies as they are presented in a project and is meant to aid in the col…☆15Jun 17, 2016Updated 9 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago