seyyid-bh / DEFCON28
☆13Updated 4 years ago
Alternatives and similar repositories for DEFCON28:
Users that are interested in DEFCON28 are comparing it to the libraries listed below
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- PENBUD is penetration testing buddy which helps you in penetration testing by making various important tools interactive.☆15Updated 4 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- Post exploitation helper☆38Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Updated 4 years ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- A list of Autopsy awesome plugins.☆74Updated 3 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 8 months ago
- ☆54Updated 4 years ago
- List of Repositories☆98Updated 3 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 3 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Automate writeup for vulnerable machines.☆40Updated 2 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 5 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- ☆81Updated 4 years ago
- ☆200Updated 3 years ago
- ☆99Updated 2 months ago
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- Learn you a book for some infosec good☆63Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago