skullspace / hacker-jeopardyLinks
☆27Updated 9 years ago
Alternatives and similar repositories for hacker-jeopardy
Users that are interested in hacker-jeopardy are comparing it to the libraries listed below
Sorting:
- How to create stickers and files for creating stickers☆32Updated last year
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Duct Tape Command and Control!☆96Updated 3 months ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- ☆32Updated 11 years ago
- Stargate☆95Updated 9 years ago
- How I hacked mine..☆21Updated 6 years ago
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- Web Sight Docker Deployment☆122Updated 7 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆294Updated last year
- ☆146Updated 9 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Extract Sense out of Gibberish stuff☆81Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- AND!XOR DEFCON 24 Badge HW and SW☆45Updated 5 years ago
- Converts and analyzes flight paths for possible surveillance activity - prototype☆24Updated 8 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 6 years ago
- for the louise☆244Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- The USB host security assessment tool☆282Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- scripts and examples for using JTAG debug tools to gain root access☆178Updated 9 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆140Updated 3 years ago
- Transparent network tap☆119Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- ☆106Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago