Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation
☆13Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for Offensive-Wireless-Security
Users that are interested in Offensive-Wireless-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 4 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- A gc and wii homebrew app to that sends a binary to the GBA using the different multiboot protocol used by the third generation of Pokémo…☆17Feb 26, 2017Updated 9 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated 3 weeks ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cybersecurity Architects Handbook, published by Packt☆28Mar 27, 2024Updated 2 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- A collection of cybersecurity challenges from the CTF Wastelands organized by Interlogica, featuring Docker-based deployment and comprehe…☆13Jul 12, 2024Updated last year
- 🐧 A curated collection of free, high quality resources to learn Linux, the command line, and system fundamentals.☆22Mar 20, 2026Updated 3 weeks ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- CCSFile Explorer by Warranty Voider☆16Mar 27, 2017Updated 9 years ago
- A lockout aware password sprayer☆15Jan 6, 2022Updated 4 years ago
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated last year
- Ingest openldap data into bloodhound☆80Apr 1, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆24Jan 24, 2025Updated last year
- Docker images for learning wifi hacking☆70Oct 26, 2018Updated 7 years ago
- API Testing and Development with Postman, Second Edition☆17Jun 18, 2024Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- ☆11Oct 17, 2024Updated last year
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆32Jan 8, 2026Updated 3 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated 2 weeks ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 9 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- See what your AI agents can access. Scan MCP configs for exposed secrets, shadow APIs, and AI models. Generate AI-BOMs for compliance.☆146Apr 9, 2026Updated last week
- ☆15Dec 6, 2023Updated 2 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Mar 25, 2024Updated 2 years ago
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆72Mar 12, 2026Updated last month
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆67Jan 4, 2026Updated 3 months ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆20Jul 21, 2025Updated 8 months ago
- ☆26Jun 2, 2023Updated 2 years ago