Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"
☆42Aug 15, 2016Updated 9 years ago
Alternatives and similar repositories for defcon24-demos
Users that are interested in defcon24-demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Jun 26, 2018Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- An FPGA I/O Device which services physical memory reads/writes via UMDF2 driver☆57Jun 28, 2018Updated 7 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Jan 13, 2026Updated 2 months ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- Scan networks for SSH servers with default username and password☆12Oct 24, 2015Updated 10 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Jul 12, 2017Updated 8 years ago
- Linux kernel module for driving an USB3380 board, exposing a /dev/pciemem device node on the analysis machine representing the physical m…☆15Nov 14, 2025Updated 4 months ago
- Dranzer is a tool that enables users to examine effective techniques for fuzz testing ActiveX controls☆36Jun 1, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- ☆19May 18, 2015Updated 10 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- Siemens Simatic S7 Metasploit Modules☆41Jul 14, 2012Updated 13 years ago
- Probing a network for Ubiquiti devices and parsing responses☆19Sep 29, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Probe Zero project - see Ndh2K16☆13Jul 3, 2016Updated 9 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago