rootsecdev / ChromeOSLinks
☆60Updated 5 years ago
Alternatives and similar repositories for ChromeOS
Users that are interested in ChromeOS are comparing it to the libraries listed below
Sorting:
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 8 years ago
- DEF CON Hacker Tracker☆107Updated 2 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- first commit☆20Updated last year
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- Common Findings Database☆100Updated 5 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 11 months ago
- penetration testing scripts☆136Updated 5 years ago
- A small script to automate project folder management and basic tool output☆35Updated 5 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Red Team Resources☆60Updated 6 years ago
- Mobile Incident Response Book☆61Updated 8 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- ☆25Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Building a community for those that both seek and wish to provide mentorship in Information Security.☆19Updated 2 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago