shortstack / HackerTracker
DEF CON Hacker Tracker
☆106Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for HackerTracker
- HackerTracker for iOS using Swift☆36Updated 2 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- Repo for MIRR Workshop Heroku app☆51Updated 4 years ago
- Web Sight Docker Deployment☆124Updated 6 years ago
- defcon 27 badge☆25Updated 5 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- Linux file read monitor☆89Updated last year
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 5 years ago
- "Honey" document generator for beacon document tracking.☆56Updated 6 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 4 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- PenText system: Easily create beautifully looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, …☆117Updated this week
- Custom firmware for DEFCON 27 badge which iterates over all types☆11Updated 5 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 5 years ago
- Continuous Integration and Development ExploiteR☆84Updated last year
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 7 months ago
- How to create stickers and files for creating stickers☆32Updated 10 months ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- Get your APT on using social media as a tool for data exfiltration.☆144Updated last year
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 5 months ago
- ☆105Updated 2 months ago
- ☆55Updated 4 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆101Updated 5 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- ☆73Updated 6 years ago
- Scoring Engine for CTF competitions☆46Updated last year