How to ARM Yourself - Bsides Tampa 2020
☆14Mar 1, 2020Updated 6 years ago
Alternatives and similar repositories for arm-yourself-talk
Users that are interested in arm-yourself-talk are comparing it to the libraries listed below
Sorting:
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Oct 22, 2020Updated 5 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 8 months ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 3 weeks ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- ☆11Jul 15, 2024Updated last year
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- Skill Endpoint for Amazon Echo Alexa Skills Kit (AKS)☆10Sep 23, 2016Updated 9 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆12Dec 15, 2024Updated last year
- ☆12Nov 15, 2021Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- PSSH provides parallel versions of OpenSSH and related tools.☆17Nov 26, 2022Updated 3 years ago
- A brute force, heuristics, stadistical and down the hill solution to solve enigma msg by KPA. ( mirror from https://code.haibane.org/cap…☆13Oct 2, 2021Updated 4 years ago
- Documentation and Support for AttackForge ReportGen☆20Jul 26, 2025Updated 7 months ago
- Collection of HTTP scanners and fuzzers.☆11Jan 23, 2025Updated last year
- ☆13Mar 12, 2022Updated 3 years ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- teler Caddy integrates the powerful security features of teler WAF into the Caddy web server, ensuring your web servers remain secure and…☆17Feb 24, 2025Updated last year
- Simply check if a domain has been registered ( or if it is resolvable ) to determine if it's available.☆10Nov 11, 2017Updated 8 years ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- ☆11Nov 8, 2022Updated 3 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Dec 28, 2018Updated 7 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Web scraping | Website cloner | Path Traversal Scanner☆16Sep 27, 2025Updated 5 months ago
- A very basic introduction to reverse engineering (in general and for Android) as well as some useful tools (apktool, dex2jar, jd-cmd) pac…☆12Jul 21, 2020Updated 5 years ago