various slides and presentations I've worked on
☆19Mar 21, 2025Updated 11 months ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 4 years ago
- ☆15May 10, 2020Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Jul 1, 2020Updated 5 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆214May 5, 2022Updated 3 years ago
- Everything about Parasite and more.☆21Apr 7, 2016Updated 9 years ago
- ☆49Feb 10, 2019Updated 7 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Statically Compiled Tools that could be used in engagements☆17Aug 29, 2022Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated last year
- assembly language examples, mostly Linux☆46Oct 21, 2020Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Kubernetes Ingress and Service monitoring of HTTP/HTTPS requests☆21Apr 19, 2020Updated 5 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- ☆101Mar 31, 2022Updated 3 years ago
- Code snippets for bare-metal malware development☆98Feb 19, 2022Updated 4 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆88Jun 13, 2019Updated 6 years ago