TalEliyahu / awesome-cybersecurity-conferencesView external linksLinks
Watch the latest awesome security talks around the globe
☆279Feb 23, 2025Updated 11 months ago
Alternatives and similar repositories for awesome-cybersecurity-conferences
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
Sorting:
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- ☆23Nov 13, 2021Updated 4 years ago
- My cheatsheet notes to pentest AWS infrastructure☆704Oct 17, 2022Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Awesome information for WebSockets security research☆300Jan 10, 2022Updated 4 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146May 18, 2024Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆186Dec 5, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- BlueHound - pinpoint the security issues that actually matter☆762Jul 12, 2023Updated 2 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,225Feb 5, 2026Updated last week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Oct 7, 2023Updated 2 years ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Updated this week
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆749Dec 19, 2023Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,680Nov 29, 2024Updated last year
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- List of Awesome macOS Red Teaming Resources.☆241Apr 15, 2022Updated 3 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Jul 5, 2025Updated 7 months ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,581Mar 4, 2024Updated last year
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- ☆37May 8, 2022Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24May 20, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆816Mar 31, 2024Updated last year
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Feb 7, 2026Updated last week
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,070Feb 9, 2026Updated last week
- Simple PoC for demonstrating Race Conditions on Websockets☆55Sep 14, 2023Updated 2 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year