ekoparty / ekolabsLinks
EKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con monitor, alimentacion de energia y acceso a internet por cable, y vos vas a traer tu maquina para mostrar tu trabajo y responder preguntas de los participantes de Ekoparty Security Conference
☆50Updated 3 years ago
Alternatives and similar repositories for ekolabs
Users that are interested in ekolabs are comparing it to the libraries listed below
Sorting:
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆125Updated last year
- penetration testing scripts☆136Updated 6 years ago
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 7 months ago
- Online client-side manager for secure storage and sharing of secrets.☆41Updated 3 years ago
- Python script to scan Git repos for interesting strings☆162Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- ☆38Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- ☆90Updated 8 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- VOIP Security Audit Framework☆109Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago
- ☆122Updated 7 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆118Updated 7 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆141Updated last year
- ☆92Updated 7 years ago
- ☆152Updated 2 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆54Updated 4 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Red Team Resources☆60Updated 6 years ago