headlesszeke / defcon26-materials
Slide deck and demo code for my DEFCON 26 talk
☆11Updated 6 years ago
Alternatives and similar repositories for defcon26-materials:
Users that are interested in defcon26-materials are comparing it to the libraries listed below
- Tools for taking over Crestron Windows CE devices☆31Updated 2 years ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆23Updated 5 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- lair-docker-compose repo☆17Updated 4 years ago
- ☆57Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Research on the Gallagher / Cardax access control system☆65Updated 5 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18Updated 4 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆56Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- A ton of helpful tools☆39Updated 3 years ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆78Updated 4 years ago
- RuraSort - A utility to sort and streamline wordlists.☆28Updated 5 years ago
- Snippets of scripting randomness☆13Updated 2 years ago
- Probing a network for Ubiquiti devices and parsing responses☆18Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 5 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆45Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆74Updated 7 years ago