chvancooten / conferences
A collection of presentations and other contributions I have made to conferences.
☆31Updated last week
Related projects: ⓘ
- Exploits made practicing for OSCE☆21Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆64Updated 2 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆36Updated 4 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Updated 4 years ago
- ☆69Updated 10 months ago
- Talk slides and material☆29Updated 5 months ago
- aggregated repo for all conferences and talks I am giving☆17Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- WMI SA stuffs☆28Updated 2 years ago
- Random☆31Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- ☆17Updated last year
- ☆38Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆93Updated 3 years ago
- ☆22Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆41Updated 2 years ago
- ☆42Updated 2 months ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- Simple AV Evasion for PE Files☆40Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆19Updated 3 years ago
- Slide decks and/or materials from conference presentations☆55Updated last year