defcon34
Here are 5 public repositories matching this topic...
A compact ESP32 Wroom32U toolkit for wireless security—scan, analyze, and spoof RF, Wi-Fi, and BLE protocols, all from an intuitive menu-driven interface. No complex commands or coding required. Designed for ease of use while exploring wireless communication in a responsible, educational manner.
-
Updated
May 21, 2026 - C++
Compositional trust analysis for Model Context Protocol (MCP) deployments. Detects authority paths that exist in practice but not in any individual server's manifest — where low-privilege tool output influences high-privilege tool execution without crossing a reviewed boundary.
-
Updated
Apr 25, 2026 - Python
Detection queries, OAuth permission risk matrix, and AI tool risk assessment checklist for measuring shadow AI and approved-software risk in enterprise environments. Validated on Microsoft Defender for Endpoint (KQL) and Rapid7 InsightIDR (LEQL). Released alongside DEF CON 34 talk "The Software Request Trap."
-
Updated
Apr 30, 2026
A benchmark for password wordlists, and a wordlist that scores well on it
-
Updated
Apr 30, 2026 - C++
Improve this page
Add a description, image, and links to the defcon34 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the defcon34 topic, visit your repo's landing page and select "manage topics."