apurvsinghgautam / conference-talks
Slides for my conference talks
☆43Updated last year
Alternatives and similar repositories for conference-talks:
Users that are interested in conference-talks are comparing it to the libraries listed below
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- A repository with informtion related to Cloud Osint☆81Updated 3 weeks ago
- ☆22Updated 4 years ago
- ☆138Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated last month
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- ☆34Updated last year
- Your go-to resource for all things OSINT☆161Updated 10 months ago
- Sniffing out well-known threat groups☆28Updated 6 months ago
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆60Updated last year
- ☆55Updated 3 years ago
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 3 months ago
- ☆12Updated 3 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆41Updated last year
- ☆19Updated 2 years ago
- MayorSec DNS Enumeration Tool☆82Updated 2 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- This is where we dump all the web 3 infromation☆40Updated 2 years ago
- ☆43Updated 8 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- Trace Labs - Search Party CTF Writeups☆91Updated 2 months ago
- Repository of cybersecurity mindmaps☆31Updated 2 years ago
- Useful resources about phishing email analysis☆78Updated 2 weeks ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- AWS S3 bucket Scanner☆9Updated 4 years ago
- ☆64Updated last year
- list of useful commands, shells and notes related to OSCP☆77Updated 6 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago