CUCyber / presentationsLinks
presentations given by CU Cyber
☆14Updated 5 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- competition hackpack used by CU Cyber☆21Updated 3 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Updated 9 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Meterpreter Scripts that I'm working on☆171Updated 7 years ago
- Get your APT on using social media as a tool for data exfiltration.☆149Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 6 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Updated 7 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- Attack Knowledge Base☆101Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 11 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- A framework for stealthy domain reconnaissance☆302Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Updated 10 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 8 years ago
- Pypykatz server☆125Updated 6 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187Updated 9 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 8 years ago
- SMB Relay Attack Script☆146Updated 7 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Updated 7 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- Big Iron Recon & Pwnage☆124Updated 4 years ago