largehadroncollider / defcon-guide
☆17Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for defcon-guide
- Checks our resources to monitor Identity Changes☆16Updated last year
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Scapy packet fragment reassembly engines☆34Updated 3 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆50Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- LittleSnitch Log Statistics Exporter☆34Updated last year
- Files vetted, and approved for public release☆53Updated 11 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 3 years ago
- ☆40Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- A memorial site for Hackers and Infosec people who have passed☆125Updated last week
- Writeup for the DEF CON 30 badge challenge☆68Updated 2 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆49Updated last week
- DEF CON Hacker Tracker☆106Updated 2 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Corelight@Home script☆40Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 7 months ago
- Collection of useful Canary tools☆69Updated this week
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆43Updated 7 months ago
- Visual Studio Code extension for MITRE ATT&CK☆52Updated 4 months ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆26Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 2 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 3 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago