Some of the presentations given by me
☆19Aug 8, 2025Updated 8 months ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Updated this week
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Probe a web server for common files and endpoints that are useful for gathering information or gaining a foothold.☆23May 20, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Aug 13, 2018Updated 7 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Apr 21, 2026Updated 2 weeks ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- The basic III-5GC is a free trial for lab research, prototype product testing and simple 5G end-to-end demonstration.☆16May 20, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Fast, zero-copy HTML Parser written in Rust☆27Dec 6, 2025Updated 4 months ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 9 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆20Apr 8, 2026Updated 3 weeks ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Simple UI for Ryu SDN controller☆11May 26, 2014Updated 11 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆78May 22, 2024Updated last year
- Node software for the Gladius network☆15Oct 25, 2017Updated 8 years ago
- Peach Fuzzer 3.x☆22Apr 7, 2016Updated 10 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16May 15, 2021Updated 4 years ago
- Port Crawler Pythonized☆19Dec 8, 2022Updated 3 years ago
- Cluster Bare Autoscaler is a tool that automatically adjusts the size of the bare-metal Kubernetes cluster.☆46Feb 17, 2026Updated 2 months ago
- ☆21Dec 4, 2014Updated 11 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- GitHub Pages☆14Nov 24, 2025Updated 5 months ago