headlesszeke / defcon26-materialsLinks
Slide deck and demo code for my DEFCON 26 talk
☆11Updated 7 years ago
Alternatives and similar repositories for defcon26-materials
Users that are interested in defcon26-materials are comparing it to the libraries listed below
Sorting:
- Tools for taking over Crestron Windows CE devices☆34Updated 3 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Setup script for Red Teams☆14Updated 9 months ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆25Updated 6 years ago
- Raspberry Pi 2 C2☆15Updated 10 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Updated 6 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Updated 5 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Updated 7 years ago
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆87Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Plugins for the Serpico Project☆23Updated 7 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆85Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Updated 3 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- Privilege escalation tools on Mainframe☆83Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 7 years ago
- Presentation Slides☆26Updated 6 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 6 years ago
- Graph visualization of wireless client and access point relationships☆117Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Capture The Flag Information☆12Updated 7 years ago
- Snippets of scripting randomness☆13Updated 3 years ago