headlesszeke / defcon26-materialsLinks
Slide deck and demo code for my DEFCON 26 talk
☆11Updated 6 years ago
Alternatives and similar repositories for defcon26-materials
Users that are interested in defcon26-materials are comparing it to the libraries listed below
Sorting:
- Tools for taking over Crestron Windows CE devices☆31Updated 3 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆24Updated 5 years ago
- Snippets of scripting randomness☆13Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆67Updated 6 years ago
- another nmap summarising script☆26Updated 4 years ago
- Rogue Synergy server☆18Updated 8 years ago
- The documents☆56Updated 7 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- RuraSort - A utility to sort and streamline wordlists.☆28Updated 5 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆79Updated 3 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Updated 6 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Updated 5 years ago
- Some useful scripts I have written or collected☆82Updated last year
- Digital Preservation Software (National Archives of Australia)☆37Updated 14 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- ☆17Updated 4 years ago
- Scan for OSGi Consoles☆21Updated last year
- Scoring Engine for CTF competitions☆48Updated 2 years ago