tsluyter / ZinesLinks
Zines about my personal learning
☆17Updated last year
Alternatives and similar repositories for Zines
Users that are interested in Zines are comparing it to the libraries listed below
Sorting:
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 4 months ago
- ☆10Updated 5 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- A static website template for security pages.☆53Updated 4 months ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- Privacy Cards for Software Developers☆54Updated 6 years ago
- DefCon Hardware Hacking Village Learn To Solder Kit☆41Updated 10 years ago
- A curated threat modeling library collection☆23Updated 2 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 5 years ago
- Overview Tooling Process Physical People☆47Updated last month
- Binary exploitation CTF challenge☆24Updated 7 years ago
- DEF CON Hacker Tracker☆108Updated 3 years ago
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Updated last year
- Red Team Resources☆60Updated 6 years ago
- ☆15Updated 5 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated last year
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Updated 6 years ago
- Capture The Flag Information☆12Updated 7 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- Rogue AP killer☆92Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- ☆198Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- ☆116Updated 6 months ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- A collection of scanned, high-resolution Hacker / Information Security Stickers from various conferences☆46Updated 5 years ago