various slides and presentations I've worked on
☆19Mar 21, 2025Updated last year
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A repo full of example gscripts☆101Sep 6, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Jul 1, 2020Updated 5 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Apr 12, 2020Updated 5 years ago
- DNS server for pentesters☆49Nov 2, 2025Updated 5 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆15May 10, 2020Updated 5 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 5 months ago
- ☆49Feb 10, 2019Updated 7 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kubernetes Ingress and Service monitoring of HTTP/HTTPS requests☆21Apr 19, 2020Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- ☆33Jun 12, 2024Updated last year
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆88Jun 13, 2019Updated 6 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆215May 5, 2022Updated 3 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- assembly language examples, mostly Linux☆46Oct 21, 2020Updated 5 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Code snippets for bare-metal malware development☆98Feb 19, 2022Updated 4 years ago
- Proof-of-concept LLVM fork to speculatively inline objc_msgSend☆16Dec 11, 2022Updated 3 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago