hevnsnt / norecognitionLinks
☆50Updated this week
Alternatives and similar repositories for norecognition
Users that are interested in norecognition are comparing it to the libraries listed below
Sorting:
- Writeup for the DEF CON 30 badge challenge☆72Updated 3 years ago
- ☆149Updated last year
- Okta Verify and Okta FastPass Abuse Tool☆337Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Bluetooth Security Assessment Methodology☆147Updated 3 weeks ago
- Canary Detection☆186Updated 3 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆80Updated 8 months ago
- ☆38Updated 2 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆107Updated 2 years ago
- Putting a leash on naughty AWS permissions☆133Updated 4 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆99Updated 6 months ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated last week
- List of past and future infosec related events.☆168Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated last month
- ☆22Updated last year
- DEFCON 32 Badge Game☆61Updated last year
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- boostsecurityio/lotp☆136Updated 3 months ago
- ☆169Updated 4 months ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 6 months ago
- ☆192Updated 9 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆115Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- OSDP attack tool (and the Elvish word for friend)☆109Updated 2 years ago
- ☆28Updated 2 years ago
- ☆29Updated 3 years ago
- A public, open source physical security methodology☆47Updated last year
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 4 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year