ekoparty / ekolabsLinks
EKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con monitor, alimentacion de energia y acceso a internet por cable, y vos vas a traer tu maquina para mostrar tu trabajo y responder preguntas de los participantes de Ekoparty Security Conference
☆50Updated 2 years ago
Alternatives and similar repositories for ekolabs
Users that are interested in ekolabs are comparing it to the libraries listed below
Sorting:
- Nix Audit made easier (RHEL, CentOS)☆65Updated 2 months ago
- ☆37Updated 5 years ago
- Rogue AP killer☆90Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆61Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- Small CTF challenges running on Docker☆159Updated 6 years ago
- Cryptovenom: The Cryptography Swiss Army Knife☆1Updated 4 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆76Updated 3 weeks ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- SDK-SMS-Stack☆29Updated 2 years ago
- ☆92Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 8 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆125Updated last year
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 4 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- ☆89Updated 7 years ago
- Fetch, install and search exploit archives from exploit sites.☆115Updated last year