Any presentation we've given at FortyNorth Security
☆33Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo is dedicated to a powerpoint exploit☆33Dec 11, 2020Updated 5 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- A ~$20.00 tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed direc…☆10Mar 25, 2018Updated 8 years ago
- Red Teaming / Pentesting challenges for my Advent-Of-Code 2021.☆105Dec 21, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆22Aug 18, 2018Updated 7 years ago
- hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe …☆26Feb 21, 2026Updated last month
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Jan 15, 2021Updated 5 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆76Mar 13, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆78Oct 16, 2019Updated 6 years ago
- CyberChef update scripts in PowerShell & Bash☆19Apr 22, 2024Updated last year
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DEFCON 30 Mainframe buffer overlow workshop container☆93Mar 2, 2024Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- ☆20May 18, 2022Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Mar 19, 2022Updated 4 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago