Presentation Slides and Video links
☆32Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Mar 7, 2019Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- ☆21Nov 19, 2025Updated 3 months ago
- Steve McCanne's Sharkfest '21 Talk☆16Oct 12, 2021Updated 4 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- ☆14Jan 14, 2026Updated last month
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- ☆24Jan 19, 2020Updated 6 years ago
- ☆134Mar 21, 2024Updated last year
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- ☆42Dec 13, 2020Updated 5 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Side Channel script☆25Mar 1, 2023Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Aug 3, 2019Updated 6 years ago
- ☆53May 21, 2018Updated 7 years ago
- From Raw Logs to Real Insights - A tutorial for getting started with log analytics using Elastic Stack.☆29Nov 19, 2020Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- ☆29Mar 15, 2017Updated 8 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- Generate network maps from packet captures☆30Sep 15, 2019Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago