largehadroncollider / defcon-guideLinks
☆17Updated 6 years ago
Alternatives and similar repositories for defcon-guide
Users that are interested in defcon-guide are comparing it to the libraries listed below
Sorting:
- ☆234Updated 5 years ago
 - A memorial site for Hackers and Infosec people who have passed☆136Updated last month
 - A tool for processing a lot of pcaps using tshark☆153Updated 2 years ago
 - Writeup for the DEF CON 30 badge challenge☆71Updated 3 years ago
 - ☆73Updated 4 years ago
 - .sub files for the LED bracelets distributed at DEFCON☆17Updated 3 months ago
 - A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆91Updated this week
 - Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
 - AHA! Website Source☆18Updated this week
 - Collection of useful Canary tools☆92Updated 2 weeks ago
 - Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
 - Corelight@Home script☆44Updated 2 years ago
 - Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
 - Different tools, koen.vanimpe@cudeso.be☆136Updated 3 months ago
 - Extract hidden data from pdf files☆57Updated 7 years ago
 - Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆95Updated 4 years ago
 - List of past and future infosec related events.☆165Updated this week
 - SANS Slingshot Linux Distribution☆54Updated 5 years ago
 - pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
 - ☆133Updated 4 years ago
 - DEF CON Hacker Tracker☆108Updated 3 years ago
 - This repository is for the vagrant instances of VulnHub machines☆47Updated last year
 - hashcat benchmarks on AWS instances☆39Updated last month
 - How to create stickers and files for creating stickers☆32Updated last year
 - Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
 - Statically Compiled Tools that could be used in engagements☆17Updated 3 years ago
 - Scapy packet fragment reassembly engines☆33Updated 4 years ago
 - list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆258Updated 10 months ago
 - Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 7 months ago
 - Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago