headlesszeke / defcon26-materialsLinks
Slide deck and demo code for my DEFCON 26 talk
☆11Updated 7 years ago
Alternatives and similar repositories for defcon26-materials
Users that are interested in defcon26-materials are comparing it to the libraries listed below
Sorting:
- Tools for taking over Crestron Windows CE devices☆31Updated 3 years ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆24Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Research on the Gallagher / Cardax access control system☆66Updated 5 years ago
- Snippets of scripting randomness☆13Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Raspberry Pi 2 C2☆15Updated 10 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆87Updated 4 years ago
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 8 years ago
- ☆15Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆84Updated 6 years ago
- RuraSort - A utility to sort and streamline wordlists.☆28Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Rogue Synergy server☆18Updated 8 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Updated 6 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- A docker container for running the hashcat brain server☆25Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- ☆57Updated 5 years ago
- Mainframe security auditing and scripts☆142Updated 7 years ago
- ☆73Updated last year
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago