rootsecdev / ChromeOS
☆62Updated 5 years ago
Alternatives and similar repositories for ChromeOS:
Users that are interested in ChromeOS are comparing it to the libraries listed below
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Continuous Integration and Development ExploiteR☆85Updated 2 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 7 months ago
- Cleans out "open" wireless connections from OSX machine☆153Updated 4 years ago
- first commit☆20Updated last year
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆190Updated 7 years ago
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆66Updated 6 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- penetration testing scripts☆137Updated 5 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 8 years ago
- Repo for MIRR Workshop Heroku app☆51Updated 4 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 6 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆105Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago