tuftsdev / DefenseAgainstTheDarkArts
☆305Updated last week
Alternatives and similar repositories for DefenseAgainstTheDarkArts:
Users that are interested in DefenseAgainstTheDarkArts are comparing it to the libraries listed below
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 6 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆629Updated 3 years ago
- Post Exploitation Wiki☆518Updated 5 years ago
- Reverse engineering basics in puzzle form☆184Updated 4 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆881Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆147Updated 4 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 5 years ago
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- A list of the resources I use as I get ready for the exam☆501Updated 2 years ago
- Issues to consider when planning a red team exercise.☆618Updated 7 years ago
- CTFs, solutions and presentations☆288Updated 2 weeks ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- A workshop on Packet Crafting using Scapy.☆157Updated 4 years ago
- Red Team Tactics, Techniques, and Procedures☆400Updated 2 months ago
- ☆234Updated 4 years ago
- ☆200Updated 3 years ago
- Learning Shodan through katas☆466Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆134Updated 3 weeks ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- ☆99Updated 2 months ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 8 months ago
- Easy 802.1Q VLAN Hopping☆378Updated 9 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago