Skip to content
Steve Matindi edited this page Aug 15, 2023 · 5 revisions

DArT

DEFCON Arsenal Tools Current Update: DC1 - DC31 Repo aims to improve this DC page -> Tools

DArT which in full stands for Defcon Arsenal Tools is a curation of all tools shared by Defcon Attendees as part of a yearly Hacker convention which takes place in Vegas, NV.

In this project, our aim is to have as many of the tools in an easier way in which attendees and those not able to attend can be able to discover the tools easily and to view the talks that come alongside those tools.

Structuring of Tools:

I had two option structures to think of when categorizing the tools shared, and in the end, thought the first option as being the best to avoid a nested repo in the long run.

Option 1: Year-Based Structure within Categories:

  • Categorizing tools based on categories present and then incrementing based on year release within that folder category.
DefconArsenalTools/
│
├── Malware/
│   ├── README.md
│   ├── DC30/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── DC31/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   └── ...
│
├── Hardening/
│   ├── README.md
│   ├── DC30/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── DC31/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   └── ...
│
├── Exploitation/
│   ├── README.md
│   ├── DC30/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── DC31/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   └── ...
│
└── ...

Option 2: Year-Based Top-Level Structure:

  • An easy way to categorize the tools based on the released years and all the tools under that year.
DefconArsenalTools/
│
├── DC30/
│   ├── Malware/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── Hardening/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── Exploitation/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   └── ...
│
├── DC31/
│   ├── Malware/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── Hardening/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   ├── Exploitation/
│   │   ├── Tool1/
│   │   ├── Tool2/
│   │   └── ...
│   │
│   └── ...
│
└── ...

Current Tool Categories present:

Folder Category About
SampleSubmission - Folder containing sample tool submission format
exploitation - Folder containing exploitation tools
frameworks - Folder containing frameworks presented at Defcon (DC)
hardening - Folder with all hardening tools as seen in Defcon
malware_research - Folder containing malware researchers whose demos were presented at Defcon
network_attacks - Folder containing network attack tools presented at Defcon Conference
phishing - Folder containing tools categorized as of phishing nature
reverse_exploitation - Folder containing reverse exploitation tools presented at Defcon
lock_picking - Folder containing lock picking materials presented at Defcon

Tool Sources

Tools Reference: => DEF CON Media Demo Prentations: => DEF CON Talks DArT on 𝕏(fka Twitter): => DArT on 𝕏(fka Twitter)

DaRT tool sample on social media


General Contribution

To submit a tool, either submit it to one of the folders in the category that matches your tool or create a new folder with your tool category if not present.

For a smooth and effective collaboration, please adhere to the following guidelines:

  • Before starting work on a new feature or tool, check the existing issues and pull requests to avoid duplication of efforts.
  • If you plan to work on an existing issue, please comment on it to let others know that you are taking care of it.
  • Be respectful and considerate towards other contributors.
  • We encourage open and constructive communication.
  • Feel free to ask questions or seek clarifications by opening a new issue.

Contribution Steps

To get started with contributing to the DArT project, follow the steps below:

Prerequisites:

Fork the Repository

Fork this repository by clicking on the "Fork" button at the top right corner of this page. This will create a copy of the DArT repository under your GitHub account.

Clone the Repository

  1. Clone the forked repository to your local machine using the following command:
git clone https://github.com/DefconParrot/DefconArsenalTools.git
  1. Navigate to the project directory:
cd DefconArsenalTools

Create a Branch

  1. Create a new branch for your contribution. Choose a descriptive name that summarizes the purpose of your changes:
git checkout -b my_contribution

Make Changes

Now you can make the necessary changes or additions to the project. You can contribute in several ways, including:

  • Adding new tools or scripts
  • Improving existing tools or scripts
  • Enhancing the project's documentation
  • Fixing bugs or issues

dctalks
Feel free to explore the project and identify areas where you can contribute effectively.

Commit and Push

Once you have made your changes, it's time to commit them and push them to your forked repository:

  1. Add the modified files to the commit:
git add .
  1. Commit your changes with a descriptive message:
git commit -m "your contribution description"
  1. Push the changes to your forked repository:
git push origin my_contribution

Submit a Pull Request

To maintain consistency throughout the project, we follow certain code styles and guidelines. When contributing to DArT, please keep the following in mind:

  • Ensure your code is well-documented and easy to understand.
  • Write meaningful commit messages that describe your changes.

Now it's time to submit a Pull Request (PR) to the main DArT repository. Follow these steps:

  1. Visit your forked repository on GitHub.
  2. Click on the "Compare & pull request" button next to your newly pushed branch.
  3. Fill in the details of your contribution in the PR description.
  4. Click on the "Create pull request" button to submit your changes for review.

Conclusion

Thank you for your interest in contributing to the Defcon Arsenal Tool (DArT) project! Your contributions play a vital role in making this project a valuable resource for the DEFCON community. We appreciate your time and effort in helping us improve the toolset and enhance the overall security landscape.

If you have any questions or need further assistance, don't hesitate to reach out by opening an issue. Happy hacking!

Contact Us (𝕏(Twitter))

License

GNU General Public License
This work is licensed under a GNU General Public License v3.0.