apasamar / RootedCON_Malaga2021Links
RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)
☆14Updated 3 years ago
Alternatives and similar repositories for RootedCON_Malaga2021
Users that are interested in RootedCON_Malaga2021 are comparing it to the libraries listed below
Sorting:
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repo…☆31Updated this week
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Updated 3 years ago
- ☆26Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 5 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- ☆24Updated 9 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Learning volatility plugins.☆19Updated 4 years ago
- Commands used in Windows penetration tests☆55Updated last month
- ☆25Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆31Updated 2 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- ☆37Updated 4 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Notes and IoCs of fresh malware☆59Updated last year