shortstack / HackerTracker
DEF CON Hacker Tracker
☆107Updated 2 years ago
Alternatives and similar repositories for HackerTracker:
Users that are interested in HackerTracker are comparing it to the libraries listed below
- HackerTracker for iOS using Swift☆36Updated 2 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Linux file read monitor☆89Updated last year
- How to create stickers and files for creating stickers☆32Updated last year
- defcon 27 badge☆25Updated 5 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- first commit☆20Updated last year
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- ☆73Updated 7 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆11Updated 5 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆109Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Slide Decks for the Majority of my Talks☆63Updated last year
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- "Honey" document generator for beacon document tracking.☆56Updated 6 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆134Updated last month
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆78Updated 6 years ago
- Threatbutt python client and Maltego transforms☆51Updated 10 months ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 5 months ago
- Continuous Integration and Development ExploiteR☆85Updated 2 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆142Updated 8 years ago