alexandreborges / cfpsec
CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org website.
☆58Updated 3 months ago
Alternatives and similar repositories for cfpsec:
Users that are interested in cfpsec are comparing it to the libraries listed below
- ☆60Updated 7 months ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 8 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- ☆15Updated 3 years ago
- Yara Rules for Modern Malware☆73Updated 11 months ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- The Dumb Network Fuzzer☆19Updated last year
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- ☆48Updated 2 years ago
- Tools that trigger False Positive AV alerts☆44Updated last month
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- A repo to support the book☆106Updated 3 years ago
- DNS File EXfiltration☆46Updated 10 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆65Updated last year
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Surface Analysis System on Cloud☆19Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆41Updated last year
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago