Slides from various talks that I've given over the years
☆118Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for Slides
Users that are interested in Slides are comparing it to the libraries listed below
Sorting:
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- ☆229May 10, 2018Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- Some PowerShell Stuff☆280Jun 15, 2022Updated 3 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆526Jan 21, 2022Updated 4 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- ☆58Jun 28, 2020Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Presentation material presented by Outflank team members at public events.☆191Oct 1, 2025Updated 5 months ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago