Slides for my conference talks
☆45Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for conference-talks
Users that are interested in conference-talks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆36Feb 17, 2021Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆44Jan 20, 2026Updated 3 months ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆47Jan 2, 2022Updated 4 years ago
- Common Bugs from low to critical Level☆16May 9, 2021Updated 4 years ago
- Tactical Observation of RF GNSS Interference☆14Jun 25, 2020Updated 5 years ago
- A research project to crawl and analyze Top 1 million domains☆25Feb 7, 2023Updated 3 years ago
- TikTok Scraper & Downloader. Scrape information from User, Trending and HashTag pages and download video posts☆13Oct 23, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆30Jan 31, 2024Updated 2 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆31May 30, 2024Updated last year
- ☆18Apr 26, 2021Updated 5 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- List of Computer Science courses with video lectures.☆12Nov 6, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool to automate recon☆45Dec 28, 2021Updated 4 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆18Mar 22, 2023Updated 3 years ago
- ☆18Sep 24, 2024Updated last year
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- community site☆14Oct 25, 2018Updated 7 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Nov 11, 2019Updated 6 years ago
- For Nano Serial Duplex hotSPOT UserGuide☆10Jul 27, 2018Updated 7 years ago
- A clean, accessible and semantic Joomla template with Sass inside!☆31Dec 1, 2015Updated 10 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- ☆11Apr 22, 2026Updated last week
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 6 years ago