rootsecdev / ChromeOSLinks
☆61Updated 6 years ago
Alternatives and similar repositories for ChromeOS
Users that are interested in ChromeOS are comparing it to the libraries listed below
Sorting:
- Cleans out "open" wireless connections from OSX machine☆154Updated 5 years ago
- DEF CON Hacker Tracker☆108Updated 3 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Linux file read monitor☆90Updated 2 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated last month
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago
- first commit☆20Updated last week
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 5 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated last year
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- penetration testing scripts☆136Updated 6 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- For importing, searching, and managing public password breach data☆161Updated last year
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆257Updated 9 months ago
- Internet data acquisition☆150Updated 4 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago