DEF CON Arsenal Tools (DArTs)🎯
@DCArsenalTools
📥Trace point for all #hacking tools, scripts, & resources showcased or used by #security researchers at @defcon #defcon | Curator: @DefconParrot
Help us expand, categorize, & organize #DEFCON Arsenal Tools—curated annually from top #security researchers at @defcon conf. Your contributions will make it easier for the community to discover, filter, and utilize these powerful tools. Get involved> github.com/DefconParrot/D…
@defcon #defcon32 hardware hacking e-zine here: github.com/jcldf/ultimate…
In honor of @defcon's 31st birthday. I present you the DEFCON 1 program in its entirety
Dear Hackers, Have you or a loved one ever wished you had a way to identify all the @defcon #stickerwall stickers? If you have, I made you a gift . defcon.hakc.ai --> github.com/haKC-ai/defcon… stickerwall.hakc.ai --> Public Google Sheet output
Cracking 5G/4G LTE Routers -Remote Code Execution to Adjacent Attacks👾 github.com/actuator/DEFCO…
A new ransomware strain named #Yurei has emerged. It is believed to be a variant of PrincessLocker and is written in Go. sample: virustotal.com/gui/file/49c72… sample: virustotal.com/gui/file/89a54… sample: virustotal.com/gui/file/f5e12… rule: valhalla.nextron-systems.com/info/rule/MAL_…
This is legit what I've been searching for without knowing it. Thank you! @kmcnam1 youtube.com/watch?v=2Ali-H…
youtube.com
YouTube
Configuring and demoing Evil Portal on the Flipper Zero
Just built my latest DIY project: The Pickle Rick Badge Raspberry Pi + LEDs + PS4 motor + sound + 3D-printed parts = wearable chaos. Inspired by the Def Con community and I’m planning to add CTF challenges soon. Build: github.com/flamur85/Pickl… #DefCon #CTF #DIY #Cybersecurity
We may drop direct author link(s) from curated tools—expired domains often get repurposed -/+ For example, one @defcon speaker’s slide has a link that now redirects to p0rn. We’ll stick to official + archived sources to keep things safe. #defcon #infosec defconparrot.com/defconarsenalt…
Si os gustó nuestra charla en DEFCON33, atención estos cracks que presentaron una charla muy buena hace 2 años en #defcon. - Explican secure boot, vulnerabilidades y bypasses - Son originales, nada de copias - Comparten TODO youtube.com/watch?v=99t7wE… github.com/HackingThings/…
youtube.com
YouTube
DEF CON 30 - Mickey Shkatov, Jesse Michael - One Bootloader to Load...
Super excited that the source code for my series of @defcon Finals CTF with @nautilus_ctf challenges jukebooox is officially released: github.com/Nautilus-Insti…
Demoed a tool or script at #DEFCON? Give it more visibility—contribute to the DEF CON Arsenal Tools repo: github.com/DefconParrot/D… Explore the curated collection and add your own=> defconparrot.com/defconarsenalt… #DEFCON #CyberSecurity #InfoSec #OpenSource #Security
Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment. Your own hands-on Entra lab for identity attack simulation. Built for red teams, blue teams and identity nerds. Check it out here👉github.com/semperis/entra…
Here's a writeup for a tool I released at #DEFCON Cloud Village called "pilreg". It also might help if you're playing @jaybeale 's Kubernetes CTF. Thanks to @JonJohnsonJr for teaching me about whiteout files which this tool hunts for. antitree.com/2025/08/defcon…
Goodbye @defcon Thanks for the presentions and all the @defconparties . CU next year. Final #defcon33 release: Zploit - Cyber Underground (No Logs, No Limits) youtube.com/watch?v=BpBpOP…
youtube.com
YouTube
Cyber Underground (No Logs, No Limits)
Years later it’s still thrilled to be on #DEFCON stage. The presentation has been released here: media.defcon.org/DEF%20CON%2033…
Hah! Made it to a LWiS release with my collection of bloatware exploits released @defcon earlier this month! Check out the repo that has POC's for CVE-2025-3462, CVE-2025-3463, CVE-2025-27812, CVE-2025-27813, CVE-2025-5491 and CVE-2025-27811 github.com/sensepost/bloa…
DEF CON releases, PDQ SmartDeploy creds (@unsigned_sh0rt), FortiSIEM root command injection (@SinSinology), a cat themed loader (@vxunderground), fine-tune LLMs for offsec (@kyleavery_), and more! blog.badsectorlabs.com/last-week-in-s…
A few days back at #DEFCON, I released the Garuda Threat Hunting Framework — crafted for manual threat hunting & detection. Here is the link: github.com/monnappa22/Gar… When integrated with LLMs, it enables AI-powered autonomous threat hunting. youtu.be/Sk_c5w1CEiY
youtube.com
YouTube
AI-Powered Threat Hunting Using Garuda Framework
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: github.com/synacktiv/Grou… This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers Slides and demos: github.com/actuator/DEFCO…
United States Trends
- 1. Seahawks 19.4K posts
- 2. Giants 65.5K posts
- 3. Bills 133K posts
- 4. Bears 58.3K posts
- 5. Caleb 47.6K posts
- 6. Dolphins 32K posts
- 7. Dart 25.3K posts
- 8. Daboll 11.2K posts
- 9. Jags 6,560 posts
- 10. Josh Allen 15.4K posts
- 11. Texans 37.2K posts
- 12. Russell Wilson 3,888 posts
- 13. Browns 36.9K posts
- 14. Rams 15.6K posts
- 15. Patriots 104K posts
- 16. Ravens 36.9K posts
- 17. Trevor Lawrence 2,438 posts
- 18. Henderson 16.9K posts
- 19. Bryce 15.4K posts
- 20. Drake Maye 15.5K posts
Something went wrong.
Something went wrong.