gsuberland / infosec-tricks
Infosec tips and tricks
☆17Updated 6 years ago
Alternatives and similar repositories for infosec-tricks:
Users that are interested in infosec-tricks are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Private keys that have become public ...☆175Updated 2 weeks ago
- 34C3 Junior CTF pwnables☆117Updated 6 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A Passive RFID fuzzer☆75Updated 2 years ago
- ☆142Updated 8 years ago
- TLS Redirection☆120Updated 7 years ago
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- Red Team Resources☆59Updated 6 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- ☆25Updated 9 years ago
- #HackingTogether☆13Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆123Updated last year