largehadroncollider / defcon-guideLinks
☆17Updated 6 years ago
Alternatives and similar repositories for defcon-guide
Users that are interested in defcon-guide are comparing it to the libraries listed below
Sorting:
- Writeup for the DEF CON 30 badge challenge☆72Updated 3 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 2 months ago
- ☆73Updated 4 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- ☆233Updated 5 years ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated last year
- A tool for processing a lot of pcaps using tshark☆154Updated 2 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Corelight@Home script☆46Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- ☆37Updated 2 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- Collection of useful Canary tools☆91Updated last month
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆132Updated 2 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 4 months ago
- The DC801 Badge Platform for DC28+☆59Updated 3 weeks ago
- ☆23Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- ☆133Updated 4 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last week
- Coming soon...☆24Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- ☆37Updated 4 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated 4 months ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago