securingdev / awesome-stickersLinks
A collection of scanned, high-resolution Hacker / Information Security Stickers from various conferences
☆46Updated 5 years ago
Alternatives and similar repositories for awesome-stickers
Users that are interested in awesome-stickers are comparing it to the libraries listed below
Sorting:
- The Cloud Blocker☆107Updated 9 months ago
- Create automated tasks and keep an eye on interesting things!☆85Updated 9 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 2 months ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆35Updated 6 years ago
- ☆70Updated 3 months ago
- Challenges for the TheManyHatsClub CTF☆11Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 2 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- CYBAR OSINT CTF 2020☆23Updated 5 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A currated list of pentest tools that are in active use by the twitter infosec community.☆42Updated 5 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆92Updated 2 years ago
- Red Team Resources☆60Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 7 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆63Updated 2 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆137Updated last year
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago