Bluehat 2018 Graphs for Security Workshop
☆42Sep 29, 2018Updated 7 years ago
Alternatives and similar repositories for Bluehat2018GraphWorkshop
Users that are interested in Bluehat2018GraphWorkshop are comparing it to the libraries listed below
Sorting:
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- ☆12May 6, 2020Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- VisualFirewall/IDS is a research-grade Firewall and IDS visualization tool that aims to provide a highly-informative interface of network…☆15Oct 6, 2014Updated 11 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- BSidesVienna Homepage☆16Updated this week
- ☆16Mar 5, 2018Updated 8 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- ☆18Dec 3, 2024Updated last year
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- repo for sharing stuff☆17Jul 1, 2025Updated 8 months ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- ☆21Nov 7, 2023Updated 2 years ago
- ☆44Oct 22, 2025Updated 4 months ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Pure Python parser for data encoded by .NET's BinaryFormatter☆54Sep 4, 2018Updated 7 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- USN to JSON☆22Apr 4, 2020Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Scripts to extract compound bplists in the iOS -> KnowledgeC.db -> structuredmetadata table.☆27May 12, 2019Updated 6 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆290Jan 15, 2024Updated 2 years ago
- Scripts for interacting with MSRC portal data☆77Sep 12, 2018Updated 7 years ago