Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation
☆13Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for Offensive-Wireless-Security
Users that are interested in Offensive-Wireless-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 4 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- A gc and wii homebrew app to that sends a binary to the GBA using the different multiboot protocol used by the third generation of Pokémo…☆17Feb 26, 2017Updated 9 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 13, 2026Updated last week
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- A collection of cybersecurity challenges from the CTF Wastelands organized by Interlogica, featuring Docker-based deployment and comprehe…☆13Jul 12, 2024Updated last year
- 🐧 A curated collection of free, high quality resources to learn Linux, the command line, and system fundamentals.☆22Updated this week
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- CCSFile Explorer by Warranty Voider☆15Mar 27, 2017Updated 8 years ago
- A lockout aware password sprayer☆15Jan 6, 2022Updated 4 years ago
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated 11 months ago
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆23Jan 24, 2025Updated last year
- Docker images for learning wifi hacking☆70Oct 26, 2018Updated 7 years ago
- API Testing and Development with Postman, Second Edition☆17Jun 18, 2024Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Jan 8, 2026Updated 2 months ago
- ☆11Oct 17, 2024Updated last year
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆20Jul 21, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- See what your AI agents can access. Scan MCP configs for exposed secrets, shadow APIs, and AI models. Generate AI-BOMs for compliance.☆144Feb 27, 2026Updated 3 weeks ago
- ☆14Dec 6, 2023Updated 2 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Mar 25, 2024Updated 2 years ago
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆71Mar 12, 2026Updated 2 weeks ago
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆67Jan 4, 2026Updated 2 months ago
- ☆26Jun 2, 2023Updated 2 years ago