Slides and Other Resources from my latest Talks and Presentations
☆24Sep 17, 2025Updated 5 months ago
Alternatives and similar repositories for Talks-and-Presentations
Users that are interested in Talks-and-Presentations are comparing it to the libraries listed below
Sorting:
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- ☆29Aug 9, 2016Updated 9 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆35Jan 16, 2026Updated last month
- ☆12Feb 16, 2017Updated 9 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ☆11Jul 10, 2024Updated last year
- ☆13Feb 12, 2017Updated 9 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Repository for third party codes.☆14Aug 19, 2019Updated 6 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- ☆11Sep 6, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- ☆13Dec 28, 2024Updated last year