DCArsenalTools Profile Banner
DEF CON Arsenal Tools (DArTs)🎯 Profile
DEF CON Arsenal Tools (DArTs)🎯

@DCArsenalTools

Followers
208
Following
28
Media
15
Statuses
347

📥Trace point for all #hacking tools, scripts, & resources showcased or used by #security researchers at @defcon #defcon | Curator: @DefconParrot

media.defcon.org
Joined August 2023
Don't wanna be here? Send us removal request.
@DCArsenalTools
DEF CON Arsenal Tools (DArTs)🎯
10 months
Help us expand, categorize, & organize #DEFCON Arsenal Tools—curated annually from top #security researchers at @defcon conf. Your contributions will make it easier for the community to discover, filter, and utilize these powerful tools. Get involved> https://t.co/trPHYxtDa4
0
0
3
@jcldf
Julio Della Flora
1 year
@defcon #defcon32 hardware hacking e-zine here: https://t.co/7bR2iHn8FH
0
1
6
@_noid_
Hot Fiendish Dr. Noid Summer
2 years
In honor of @defcon's 31st birthday. I present you the DEFCON 1 program in its entirety
8
78
194
@CoryKennedy
coriankenne͈̮̝͌̒́d̛͚̘̭̖̞̋́́̚ỹ̩̝͚̫̲̆̋̀͞ ✱
3 months
Dear Hackers, Have you or a loved one ever wished you had a way to identify all the @defcon #stickerwall stickers? If you have, I made you a gift . https://t.co/MhZmomq8up  -->  https://t.co/1oMPj47E4u https://t.co/DrxfKflUUM  --> Public Google Sheet output
0
2
5
@MalGamy12
Gameel Ali 🤘
3 months
A new ransomware strain named #Yurei has emerged. It is believed to be a variant of PrincessLocker and is written in Go. sample: https://t.co/hy0X8J3dHO sample: https://t.co/kIeMfqN35H sample: https://t.co/ooueAbFwEz rule: https://t.co/bElzz5X7tI
5
50
161
@gcvftw
GcvSentinel
3 months
This is legit what I've been searching for without knowing it. Thank you! @kmcnam1 https://t.co/D0LKRaG7AZ
1
1
2
@flamurtony
Tony
3 months
Just built my latest DIY project: The Pickle Rick Badge Raspberry Pi + LEDs + PS4 motor + sound + 3D-printed parts = wearable chaos. Inspired by the Def Con community and I’m planning to add CTF challenges soon. Build: https://t.co/nG0W66s8nq #DefCon #CTF #DIY #Cybersecurity
0
1
2
@DCArsenalTools
DEF CON Arsenal Tools (DArTs)🎯
3 months
We may drop direct author link(s) from curated tools—expired domains often get repurposed -/+ For example, one @defcon speaker’s slide has a link that now redirects to p0rn. We’ll stick to official + archived sources to keep things safe. #defcon #infosec https://t.co/sDRgWzB4jS
0
1
1
@merytkdsj
Mery
4 months
Si os gustó nuestra charla en DEFCON33, atención estos cracks que presentaron una charla muy buena hace 2 años en #defcon. - Explican secure boot, vulnerabilidades y bypasses - Son originales, nada de copias - Comparten TODO https://t.co/3w01vHsHsK https://t.co/qMiXXcCTcr
0
4
4
@adamdoupe
Adam Doupé
4 months
Super excited that the source code for my series of @defcon Finals CTF with @nautilus_ctf challenges jukebooox is officially released: https://t.co/PyCGtYmXtF
2
6
57
@DefconParrot
DEF CON Parrot🦜
4 months
Demoed a tool or script at #DEFCON? Give it more visibility—contribute to the DEF CON Arsenal Tools repo: https://t.co/qudm5flknt Explore the curated collection and add your own=> https://t.co/Xf0Rj40oeT #DEFCON #CyberSecurity #InfoSec #OpenSource #Security
0
1
5
@TomerNahum1
Tomer Nahum
4 months
Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment. Your own hands-on Entra lab for identity attack simulation. Built for red teams, blue teams and identity nerds. Check it out here👉 https://t.co/5qlXQiSYHS
8
237
703
@antitree
Mark Manning
4 months
Here's a writeup for a tool I released at #DEFCON Cloud Village called "pilreg". It also might help if you're playing @jaybeale 's Kubernetes CTF. Thanks to @JonJohnsonJr for teaching me about whiteout files which this tool hunts for. https://t.co/2UJINYAyZV
0
4
11
@killminus5
Sigtrap
4 months
Goodbye @defcon Thanks for the presentions and all the @defconparties . CU next year. Final #defcon33 release: Zploit - Cyber Underground (No Logs, No Limits) https://t.co/NauROrDgVm
0
2
2
@flanker_hqd
flanker017
4 months
Years later it’s still thrilled to be on #DEFCON stage. The presentation has been released here: https://t.co/NYNGSYf0zk
0
8
95
@leonjza
_leon_jacobs(💥)
4 months
Hah! Made it to a LWiS release with my collection of bloatware exploits released @defcon earlier this month! Check out the repo that has POC's for CVE-2025-3462, CVE-2025-3463, CVE-2025-27812, CVE-2025-27813, CVE-2025-5491 and CVE-2025-27811 https://t.co/f1OFLvLxyM
Tweet card summary image
github.com
LPE / RCE Exploits for various vulnerable "Bloatware" products - sensepost/bloatware-pwn
@lastweekinfosec
Last Week in Security (LWiS)
4 months
DEF CON releases, PDQ SmartDeploy creds (@unsigned_sh0rt), FortiSIEM root command injection (@SinSinology), a cat themed loader (@vxunderground), fine-tune LLMs for offsec (@kyleavery_), and more!
0
7
15
@monnappa22
Monnappa K A
4 months
A few days back at #DEFCON, I released the Garuda Threat Hunting Framework — crafted for manual threat hunting & detection. Here is the link: https://t.co/YlR8MYOVmm When integrated with LLMs, it enables AI-powered autonomous threat hunting. https://t.co/WnYcGQSuCY
1
19
36
@Synacktiv
Synacktiv
4 months
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: https://t.co/CWLknch5RZ This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
Tweet card summary image
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
1
99
241
@zeeshankghouri
Zeeshan Khan ⚡🜏 | InfoSec & Chaos
4 months
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers Slides and demos:
Tweet card summary image
github.com
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers - actuator/DEFCON-33
0
1
1