seyyid-bh / DEFCON28Links
☆13Updated 5 years ago
Alternatives and similar repositories for DEFCON28
Users that are interested in DEFCON28 are comparing it to the libraries listed below
Sorting:
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 5 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- ☆54Updated 5 years ago
- ☆168Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated last year
- ☆201Updated 4 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆356Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆300Updated last week
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- PENBUD is penetration testing buddy which helps you in penetration testing by making various important tools interactive.☆15Updated 4 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆146Updated 5 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 3 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆187Updated 3 months ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆305Updated last year
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 5 years ago
- AI-based, context-driven network device ranking☆302Updated last year
- Collection of PowerShell network security scripts for system administrators.☆156Updated 6 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Collection of pentesting scripts☆440Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆136Updated 7 months ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆485Updated 6 years ago
- ATTPwn☆217Updated last year
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 6 years ago
- Custom checklists, cheatsheets, links, and scripts☆128Updated 6 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- ☆99Updated 9 months ago