CUCyber / presentationsLinks
presentations given by CU Cyber
☆14Updated 5 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- competition hackpack used by CU Cyber☆21Updated 3 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Updated 10 years ago
- Meterpreter Scripts that I'm working on☆171Updated 7 years ago
- Get your APT on using social media as a tool for data exfiltration.☆149Updated 3 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Updated 9 years ago
- Attack Knowledge Base☆101Updated 8 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- Common Findings Database☆101Updated 6 years ago
- ☆251Updated 6 years ago
- A command line tool for creating malicious outlook rules☆165Updated 7 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Updated 3 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187Updated 9 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆145Updated 10 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- ☆208Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 6 years ago
- 504 VSAgent☆25Updated 7 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 8 years ago
- Rogue AP killer☆91Updated 8 years ago