CyberSaiyanIT / RomHack-ConferenceLinks
Here you can find video, slides and other stuff related to RomHack Conference since the beginning (2018). Enjoy!
☆18Updated 2 months ago
Alternatives and similar repositories for RomHack-Conference
Users that are interested in RomHack-Conference are comparing it to the libraries listed below
Sorting:
- Indicator of Compromise Scanner for CVE-2019-19781☆58Updated 5 years ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Updated 4 years ago
- Windows EDR agent in Rust. ETW telemetry → Sigma/YARA detection → ECS alerts. User-mode, open-source, high-performance.☆57Updated this week
- ☆80Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- ☆53Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Updated 6 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 3 weeks ago
- ☆15Updated 4 years ago
- ☆12Updated 4 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ☆34Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated 2 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Updated 4 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Updated 2 years ago
- ☆10Updated 2 years ago
- OpenSSHd Security Config Checker☆26Updated 5 months ago
- some config files☆14Updated last month
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Updated 6 years ago
- ☆36Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆66Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- ☆11Updated 3 years ago