Watch the latest awesome security talks around the globe
☆280Feb 23, 2025Updated last year
Alternatives and similar repositories for awesome-cybersecurity-conferences
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
Sorting:
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- ☆23Nov 13, 2021Updated 4 years ago
- My cheatsheet notes to pentest AWS infrastructure☆704Oct 17, 2022Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Awesome information for WebSockets security research☆301Jan 10, 2022Updated 4 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆187Dec 5, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,303Updated this week
- BlueHound - pinpoint the security issues that actually matter☆760Jul 12, 2023Updated 2 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Oct 7, 2023Updated 2 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,271Feb 5, 2026Updated last month
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,698Nov 29, 2024Updated last year
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Jul 5, 2025Updated 8 months ago
- List of Awesome macOS Red Teaming Resources.☆241Apr 15, 2022Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆766Dec 2, 2024Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,583Mar 4, 2024Updated 2 years ago
- ☆37May 8, 2022Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Updated this week
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,074Feb 25, 2026Updated last week
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago