Professor-plum / Presentations
Collections of past presentation slides
☆12Updated 3 years ago
Alternatives and similar repositories for Presentations:
Users that are interested in Presentations are comparing it to the libraries listed below
- Deny list generator for password filters☆25Updated 8 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- A curated checklist of tasks to be done during engagements☆32Updated 7 months ago
- list of useful commands, shells and notes related to OSCP☆25Updated 7 years ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year
- ☆24Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 8 months ago
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- ☆38Updated 4 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆52Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- ☆20Updated last year
- ☆64Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆32Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- List of Command&Control (C2) software☆36Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 2 months ago
- list of useful commands, shells and notes related to OSCP☆79Updated 7 years ago
- A network logging tool that logs per process activities☆32Updated last year
- A user enumeration tool for Slack.☆28Updated 10 months ago
- ☆34Updated last year