headlesszeke / defcon26-materialsLinks
Slide deck and demo code for my DEFCON 26 talk
☆11Updated 7 years ago
Alternatives and similar repositories for defcon26-materials
Users that are interested in defcon26-materials are comparing it to the libraries listed below
Sorting:
- Tools for taking over Crestron Windows CE devices☆32Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆24Updated 5 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Updated 5 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Raspberry Pi 2 C2☆15Updated 10 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆84Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Snippets of scripting randomness☆13Updated 3 years ago
- A RADIUS authentication server audit tool☆79Updated 7 years ago
- RuraSort - A utility to sort and streamline wordlists.☆28Updated 5 years ago
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 9 years ago
- ☆28Updated 8 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Updated 4 months ago
- The Cloud Blocker☆108Updated 9 months ago
- Passive internal reconnaissance tool☆72Updated 3 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Setup script for Red Teams☆14Updated 7 months ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Automated daily scan using Nmap and report on the differences☆91Updated 7 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Sysmon configuration file template with default high-quality event tracing☆11Updated 8 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Research on the Gallagher / Cardax access control system☆67Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆86Updated 6 years ago