mainframed / DC30_WorkshopLinks
DEFCON 30 Mainframe buffer overlow workshop container
☆92Updated last year
Alternatives and similar repositories for DC30_Workshop
Users that are interested in DC30_Workshop are comparing it to the libraries listed below
Sorting:
- ☆94Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Upload files done during my research.☆169Updated 2 months ago
- Posts about different topics☆39Updated 5 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- All kinds of tiny shells☆65Updated 3 years ago
- ☆120Updated 3 years ago
- ☆55Updated last month
- a map for the azure oriented pentests☆70Updated 2 years ago
- Damn Vulnerable CICS Application☆29Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆40Updated 3 years ago
- A repo to support the book☆113Updated 4 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆63Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- ☆42Updated 3 years ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- ☆116Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Source Code Management Attack Toolkit☆134Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago