apasamar / c0r0n4con_talkLinks
c0r0n4con talk 12 april 2020
☆23Updated 5 years ago
Alternatives and similar repositories for c0r0n4con_talk
Users that are interested in c0r0n4con_talk are comparing it to the libraries listed below
Sorting:
- PoC for extracting office files into PDF file metadata☆10Updated 5 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 6 years ago
- material for exploit development☆17Updated 6 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Learning material for completely newcomers in the field of BOFs☆14Updated 5 years ago
- revshell is a custom script to print a lot of reverse options to copy paste with a given IP and port☆18Updated 4 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- ☆51Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- ☆19Updated 3 years ago
- XOR Key Extractor☆50Updated 10 months ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Updated 2 years ago
- Posts about different topics☆36Updated last year
- ☆69Updated 3 years ago
- AutoDecoder tool for CTFs☆17Updated 6 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- IcedID Decryption Tool☆28Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- Learning volatility plugins.☆19Updated 4 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Site for IWS book content☆18Updated 6 years ago
- Thor Artifacts for Velociraptor☆16Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago