shortstack / HackerTracker
DEF CON Hacker Tracker
☆107Updated 2 years ago
Alternatives and similar repositories for HackerTracker:
Users that are interested in HackerTracker are comparing it to the libraries listed below
- HackerTracker for iOS using Swift☆36Updated 2 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 5 years ago
- defcon 27 badge☆25Updated 5 years ago
- Repo for MIRR Workshop Heroku app☆51Updated 4 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Linux file read monitor☆89Updated last year
- How to create stickers and files for creating stickers☆32Updated last year
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆11Updated 5 years ago
- ☆17Updated 5 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 6 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Threatbutt python client and Maltego transforms☆51Updated 9 months ago
- Common Findings Database☆100Updated 5 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆116Updated 6 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- ☆15Updated 9 years ago
- CTF-Circle Resources for CTFs and other things☆15Updated 6 years ago
- AHA! Website Source☆19Updated this week
- Continuous Integration and Development ExploiteR☆85Updated 2 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- first commit☆20Updated last year
- The 2017 Crypto and Privacy Village Badge☆31Updated 4 years ago