A collection of my presentation materials.
☆17Apr 29, 2024Updated last year
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Managed code hooking template.☆134Nov 19, 2021Updated 4 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Mar 8, 2023Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆95Jun 20, 2022Updated 3 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 6 years ago
- Extracting Syscall Stub, Modernized☆65Apr 2, 2022Updated 3 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 4 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Metamorphic Code Generator & Loader☆15Dec 7, 2020Updated 5 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- Example on how to consume a COM server from a .NET client and a .NET server from a COM client. Examples are for both using the Registry a…☆78Oct 16, 2019Updated 6 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Feb 25, 2023Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- ☆15Dec 16, 2020Updated 5 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago