largehadroncollider / defcon-guideLinks
☆17Updated 5 years ago
Alternatives and similar repositories for defcon-guide
Users that are interested in defcon-guide are comparing it to the libraries listed below
Sorting:
- .sub files for the LED bracelets distributed at DEFCON☆16Updated 9 months ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated last year
- How to create stickers and files for creating stickers☆32Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- LittleSnitch Log Statistics Exporter☆33Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Scans the typos of candidate election pages for typosquatters☆18Updated 6 years ago
- Postman collection to interact with the Shodan API☆25Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 3 weeks ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated 2 months ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- ☆10Updated 4 years ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated 11 months ago
- Universal Honey Pot☆29Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago