Some of the presentations given by me
☆19Aug 8, 2025Updated 6 months ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated last month
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Hybrid Port Knocking System☆22Jan 11, 2021Updated 5 years ago
- ☆16May 15, 2021Updated 4 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 10 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- ASUSTeK AsIO3 I/O driver unlock☆23Apr 22, 2021Updated 4 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago