DEF CON Arsenal Tools (DArTs)🎯
@DCArsenalTools
Followers
208
Following
28
Media
15
Statuses
347
📥Trace point for all #hacking tools, scripts, & resources showcased or used by #security researchers at @defcon #defcon | Curator: @DefconParrot
media.defcon.org
Joined August 2023
Help us expand, categorize, & organize #DEFCON Arsenal Tools—curated annually from top #security researchers at @defcon conf. Your contributions will make it easier for the community to discover, filter, and utilize these powerful tools. Get involved> https://t.co/trPHYxtDa4
0
0
3
0
1
6
Dear Hackers, Have you or a loved one ever wished you had a way to identify all the @defcon #stickerwall stickers? If you have, I made you a gift . https://t.co/MhZmomq8up --> https://t.co/1oMPj47E4u
https://t.co/DrxfKflUUM --> Public Google Sheet output
0
2
5
Cracking 5G/4G LTE Routers -Remote Code Execution to Adjacent Attacks👾 https://t.co/ZvtnCIwsxn
github.com
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers - actuator/DEFCON-33
1
8
26
A new ransomware strain named #Yurei has emerged. It is believed to be a variant of PrincessLocker and is written in Go. sample: https://t.co/hy0X8J3dHO sample: https://t.co/kIeMfqN35H sample: https://t.co/ooueAbFwEz rule: https://t.co/bElzz5X7tI
5
50
161
This is legit what I've been searching for without knowing it. Thank you! @kmcnam1
https://t.co/D0LKRaG7AZ
1
1
2
Just built my latest DIY project: The Pickle Rick Badge Raspberry Pi + LEDs + PS4 motor + sound + 3D-printed parts = wearable chaos. Inspired by the Def Con community and I’m planning to add CTF challenges soon. Build: https://t.co/nG0W66s8nq
#DefCon #CTF #DIY #Cybersecurity
0
1
2
We may drop direct author link(s) from curated tools—expired domains often get repurposed -/+ For example, one @defcon speaker’s slide has a link that now redirects to p0rn. We’ll stick to official + archived sources to keep things safe. #defcon #infosec
https://t.co/sDRgWzB4jS
0
1
1
Si os gustó nuestra charla en DEFCON33, atención estos cracks que presentaron una charla muy buena hace 2 años en #defcon. - Explican secure boot, vulnerabilidades y bypasses - Son originales, nada de copias - Comparten TODO https://t.co/3w01vHsHsK
https://t.co/qMiXXcCTcr
0
4
4
Super excited that the source code for my series of @defcon Finals CTF with @nautilus_ctf challenges jukebooox is officially released: https://t.co/PyCGtYmXtF
2
6
57
Demoed a tool or script at #DEFCON? Give it more visibility—contribute to the DEF CON Arsenal Tools repo: https://t.co/qudm5flknt Explore the curated collection and add your own=> https://t.co/Xf0Rj40oeT
#DEFCON #CyberSecurity #InfoSec #OpenSource #Security
0
1
5
Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment. Your own hands-on Entra lab for identity attack simulation. Built for red teams, blue teams and identity nerds. Check it out here👉 https://t.co/5qlXQiSYHS
8
237
703
Here's a writeup for a tool I released at #DEFCON Cloud Village called "pilreg". It also might help if you're playing @jaybeale 's Kubernetes CTF. Thanks to @JonJohnsonJr for teaching me about whiteout files which this tool hunts for. https://t.co/2UJINYAyZV
0
4
11
Goodbye @defcon Thanks for the presentions and all the @defconparties . CU next year. Final #defcon33 release: Zploit - Cyber Underground (No Logs, No Limits) https://t.co/NauROrDgVm
0
2
2
Years later it’s still thrilled to be on #DEFCON stage. The presentation has been released here: https://t.co/NYNGSYf0zk
0
8
95
Hah! Made it to a LWiS release with my collection of bloatware exploits released @defcon earlier this month! Check out the repo that has POC's for CVE-2025-3462, CVE-2025-3463, CVE-2025-27812, CVE-2025-27813, CVE-2025-5491 and CVE-2025-27811 https://t.co/f1OFLvLxyM
github.com
LPE / RCE Exploits for various vulnerable "Bloatware" products - sensepost/bloatware-pwn
DEF CON releases, PDQ SmartDeploy creds (@unsigned_sh0rt), FortiSIEM root command injection (@SinSinology), a cat themed loader (@vxunderground), fine-tune LLMs for offsec (@kyleavery_), and more!
0
7
15
A few days back at #DEFCON, I released the Garuda Threat Hunting Framework — crafted for manual threat hunting & detection. Here is the link: https://t.co/YlR8MYOVmm When integrated with LLMs, it enables AI-powered autonomous threat hunting. https://t.co/WnYcGQSuCY
1
19
36
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: https://t.co/CWLknch5RZ This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
1
99
241
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers Slides and demos:
github.com
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers - actuator/DEFCON-33
0
1
1