☆13Apr 30, 2016Updated 9 years ago
Alternatives and similar repositories for bsidesaustin
Users that are interested in bsidesaustin are comparing it to the libraries listed below
Sorting:
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated last year
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Jan 22, 2018Updated 8 years ago
- ☆20Dec 29, 2015Updated 10 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 5 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago