largehadroncollider / defcon-guide
☆17Updated 5 years ago
Alternatives and similar repositories for defcon-guide:
Users that are interested in defcon-guide are comparing it to the libraries listed below
- LittleSnitch Log Statistics Exporter☆33Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- SANS CTI Summit 2021 Resources☆11Updated last year
- .sub files for the LED bracelets distributed at DEFCON☆16Updated 7 months ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- ☆48Updated 3 months ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated 2 weeks ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆54Updated 4 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- Universal Honey Pot☆29Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated last year
- A memorial site for Hackers and Infosec people who have passed☆135Updated this week
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆46Updated 7 years ago
- The Cloud Blocker☆104Updated 2 months ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆92Updated 3 years ago
- Files vetted, and approved for public release☆53Updated last year
- Checks our resources to monitor Identity Changes☆16Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last week
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year