A collection of presentations and other contributions I have made to conferences.
☆36Sep 9, 2024Updated last year
Alternatives and similar repositories for conferences
Users that are interested in conferences are comparing it to the libraries listed below
Sorting:
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- COFF and BOF Loader written in Nim☆175Aug 1, 2022Updated 3 years ago
- Black cat magic ฅ(^・ω・^ฅ ✿)☆55Sep 28, 2022Updated 3 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- ☆15Sep 4, 2024Updated last year
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- ☆13Jan 17, 2025Updated last year
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 5 months ago
- ☆33Jan 23, 2025Updated last year
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆107Dec 22, 2021Updated 4 years ago
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Nim Library for Offensive Security Development☆197Sep 4, 2023Updated 2 years ago
- Pascal Offsec repo for malware dev and red teaming 🚩☆190Oct 13, 2023Updated 2 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- ☆60Apr 25, 2025Updated 10 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago