largehadroncollider / defcon-guideLinks
☆17Updated 6 years ago
Alternatives and similar repositories for defcon-guide
Users that are interested in defcon-guide are comparing it to the libraries listed below
Sorting:
- LittleSnitch Log Statistics Exporter☆34Updated 2 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated this week
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Collection of useful Canary tools☆82Updated 2 weeks ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- ☆39Updated 4 years ago
- ☆48Updated 5 months ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 10 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Extract hidden data from pdf files☆55Updated 6 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated 2 years ago
- Central correlator for opencanary instances☆17Updated 3 years ago
- A memorial site for Hackers and Infosec people who have passed☆136Updated 2 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- Different tools, koen.vanimpe@cudeso.be☆133Updated 2 weeks ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated last year
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- Team hashcat event writeups and tools☆50Updated 10 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Files vetted, and approved for public release☆53Updated last year
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 4 years ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆43Updated 2 weeks ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago