☆48Nov 3, 2023Updated 2 years ago
Alternatives and similar repositories for infosec-talks
Users that are interested in infosec-talks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Here I store my proof of concepts☆15Sep 6, 2024Updated last year
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- beside-ng module for the WiFi Pineapple☆14Apr 20, 2024Updated 2 years ago
- OSCP - Study☆13Aug 18, 2021Updated 4 years ago
- TsTeleport Dynamic Virtual Channel Example Experimentation☆15Feb 2, 2014Updated 12 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆43Feb 19, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆159Jul 14, 2025Updated 9 months ago
- ☆15Apr 5, 2026Updated last month
- ☆67Oct 10, 2023Updated 2 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 3 years ago
- Slides from out talk at BH IL 2022☆29Mar 21, 2022Updated 4 years ago
- This is a collection of Worms for educational purposes☆36Jul 17, 2025Updated 9 months ago
- DroneSecurity Fuzzer (NDSS 2023)☆24Jul 10, 2023Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆912Mar 25, 2026Updated last month
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Proof-of-concept code for various bugs☆111Oct 30, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆353Aug 29, 2024Updated last year
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 6 months ago
- Command line utility to extract a single layer tarball from a saved docker image tarball☆18Dec 29, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- Pascal Offsec repo for malware dev and red teaming 🚩☆190Oct 13, 2023Updated 2 years ago
- WLEAPP is an open source project that aims to parse Windows OS artifacts for the purpose of triage analysis.☆34Nov 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- ☆30Sep 5, 2025Updated 8 months ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆24Nov 16, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- A demo of a clickable map of voronoi cells, implemented using the Godot Engine.☆23Jun 9, 2023Updated 2 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago