☆49Nov 3, 2023Updated 2 years ago
Alternatives and similar repositories for infosec-talks
Users that are interested in infosec-talks are comparing it to the libraries listed below
Sorting:
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 4 months ago
- ProxyWatch☆37Updated this week
- OSCP - Study☆13Aug 18, 2021Updated 4 years ago
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- TsTeleport Dynamic Virtual Channel Example Experimentation☆15Feb 2, 2014Updated 12 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆18Feb 2, 2023Updated 3 years ago
- beside-ng module for the WiFi Pineapple☆15Apr 20, 2024Updated last year
- ☆67Oct 10, 2023Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆900Jan 21, 2025Updated last year
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- How to setup Pycharm to run scripts in IDA using the Run menu (or a keybind)☆42Jun 3, 2024Updated last year
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- 🔓 Decrypt strings from a .NET module dump protected by Themida, the advanced windows software protection system☆19Mar 20, 2021Updated 4 years ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆74Feb 19, 2026Updated 2 weeks ago
- ASProtect reverse engineering & analysis WinDbg extension☆23Nov 16, 2020Updated 5 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆21Oct 6, 2025Updated 5 months ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Aug 29, 2024Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆362Dec 19, 2022Updated 3 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- ☆21May 17, 2023Updated 2 years ago
- This is a collection of Worms for educational purposes☆34Jul 17, 2025Updated 7 months ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago