shortstack / HackerTrackerLinks
DEF CON Hacker Tracker
☆108Updated 3 years ago
Alternatives and similar repositories for HackerTracker
Users that are interested in HackerTracker are comparing it to the libraries listed below
Sorting:
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆36Updated 6 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 5 months ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Linux file read monitor☆90Updated 2 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆261Updated 3 weeks ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Continuous Integration and Development ExploiteR☆87Updated 3 years ago
- How to create stickers and files for creating stickers☆32Updated 2 years ago
- Web Sight Docker Deployment☆122Updated 8 years ago
- AHA! Website Source☆19Updated last month
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- HackerTracker for iOS using Swift☆37Updated 3 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- "Honey" document generator for beacon document tracking.☆58Updated 7 years ago
- ☆73Updated 7 years ago
- food food food☆239Updated last month
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 7 years ago
- Slide Decks for the Majority of my Talks☆63Updated last year
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 5 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- ☆208Updated 7 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 10 years ago
- ☆61Updated 6 years ago