cedowens / PresentationsLinks
Collection of Slides From My Conference Talks
☆20Updated 2 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆82Updated last month
- ☆15Updated 3 years ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- ☆60Updated 2 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- ☆70Updated 2 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆93Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- ☆118Updated 5 months ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆32Updated 7 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆13Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆18Updated last year
- This script is a multi-threaded Okta password sprayer.☆72Updated last year