various slides and presentations I've worked on
☆19Mar 21, 2025Updated last year
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Apr 12, 2020Updated 5 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- ☆15May 10, 2020Updated 5 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- ☆49Feb 10, 2019Updated 7 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- Kubernetes Ingress and Service monitoring of HTTP/HTTPS requests☆21Apr 19, 2020Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- ☆33Jun 12, 2024Updated last year
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆87Jun 13, 2019Updated 6 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆215May 5, 2022Updated 3 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- assembly language examples, mostly Linux☆46Oct 21, 2020Updated 5 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Code snippets for bare-metal malware development☆98Feb 19, 2022Updated 4 years ago
- Proof-of-concept LLVM fork to speculatively inline objc_msgSend☆16Dec 11, 2022Updated 3 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago