Slides for my conference talks
☆45Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for conference-talks
Users that are interested in conference-talks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- A research project to crawl and analyze Top 1 million domains☆24Feb 7, 2023Updated 3 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆18Apr 26, 2021Updated 4 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tool to automate recon☆45Dec 28, 2021Updated 4 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆17Mar 22, 2023Updated 3 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 5 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- ☆18Sep 24, 2024Updated last year
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- community site☆15Oct 25, 2018Updated 7 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆41Sep 9, 2024Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Docker: Alpine Linux and Wekan <=> MongoDB☆10Mar 27, 2025Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- LittleBrother is an information collection tool (OSINT), It is basically a CLI based tool which aims to carry out research on a French, S…☆23Mar 28, 2023Updated 3 years ago
- Checker for "morally correct" induction proofs about haskell programs☆10Mar 16, 2022Updated 4 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year