SecurityBsidesIT / BSidesRoma
SecurityBsides Roma Conference Repo
☆10Updated 2 years ago
Alternatives and similar repositories for BSidesRoma
Users that are interested in BSidesRoma are comparing it to the libraries listed below
Sorting:
- ☆28Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆32Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 weeks ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- ☆18Updated last year
- ☆12Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- ☆21Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- ☆24Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago