pedbsktbll / projectwizard
☆13Updated 8 years ago
Alternatives and similar repositories for projectwizard:
Users that are interested in projectwizard are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Honeybadger Red Edition☆13Updated 7 years ago
- Network sinkhole for isolated malware analysis☆40Updated 6 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 3 years ago
- threadmap plugin for Volatility Foundation☆27Updated 3 years ago
- Word split utility☆13Updated 6 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- ☆12Updated 8 years ago
- ☆68Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Python interface to the CRITs API☆22Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Registry Miner☆14Updated 6 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆19Updated 6 years ago
- ☆18Updated last year
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago