docker-training / security-workshopLinks
Repository for Security Workshop content
☆20Updated 8 years ago
Alternatives and similar repositories for security-workshop
Users that are interested in security-workshop are comparing it to the libraries listed below
Sorting:
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- ☆12Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A web spider's worst nightmare.☆53Updated 13 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- ☆15Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- YAPDNS☆39Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago