praetorian-inc / bsidesaustinView external linksLinks
☆13Apr 30, 2016Updated 9 years ago
Alternatives and similar repositories for bsidesaustin
Users that are interested in bsidesaustin are comparing it to the libraries listed below
Sorting:
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 9 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Scapy hands-on at #GreHack16☆15Nov 19, 2016Updated 9 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated last year
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- ☆27Dec 20, 2018Updated 7 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30May 24, 2013Updated 12 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- ☆20Dec 29, 2015Updated 10 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 5 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago