ekoparty / ekolabsLinks
EKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con monitor, alimentacion de energia y acceso a internet por cable, y vos vas a traer tu maquina para mostrar tu trabajo y responder preguntas de los participantes de Ekoparty Security Conference
☆50Updated 3 years ago
Alternatives and similar repositories for ekolabs
Users that are interested in ekolabs are comparing it to the libraries listed below
Sorting:
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 5 months ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- ☆37Updated 5 years ago
- Rogue AP killer☆92Updated 7 years ago
- ☆75Updated 11 years ago
- ☆105Updated 6 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆124Updated last year
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- ☆90Updated 8 years ago
- Discover target social media profiles☆81Updated 3 years ago
- ☆92Updated 7 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Just a collection of pentest stuffs☆93Updated 5 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago
- Online client-side manager for secure storage and sharing of secrets.☆41Updated 3 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- SDK-SMS-Stack☆29Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated last year
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆76Updated 4 months ago