hevnsnt / norecognitionLinks
☆51Updated this week
Alternatives and similar repositories for norecognition
Users that are interested in norecognition are comparing it to the libraries listed below
Sorting:
- Okta Verify and Okta FastPass Abuse Tool☆338Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 7 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆107Updated 2 years ago
- Canary Detection☆186Updated 2 months ago
- ☆22Updated last year
- Phone bluetooth suite that can track and prompt user notification☆17Updated last year
- Bluetooth Security Assessment Methodology☆147Updated last year
- Knowledge base on cybercriminal concealment techniques☆91Updated 8 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- List of past and future infosec related events.☆167Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated 3 weeks ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- OWASP Foundation web repository☆44Updated 2 weeks ago
- ☆169Updated 3 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆96Updated 5 months ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 3 years ago
- A public, open source physical security methodology☆47Updated last year
- Putting a leash on naughty AWS permissions☆132Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Updated 5 months ago
- ☆82Updated last month
- Neuviks Terraform Red Team Workshop☆14Updated 4 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- ☆116Updated 2 years ago
- ☆149Updated last year
- ☆50Updated last year
- Dredging up secrets from the depths of the file system☆131Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated last week
- A simple Python script to do quick, targeted recon of a given domain.☆64Updated 8 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Updated last year