☆23Aug 10, 2020Updated 5 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- ☆15Aug 7, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Fast Subdomain Enumeration Tool made with Bash only 💯☆15Nov 3, 2021Updated 4 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- VirusTotal public api interface implementation in Golang.☆15Sep 23, 2014Updated 11 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated last month
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆131Oct 24, 2022Updated 3 years ago
- Resources for HFS+ Forensics☆37Nov 15, 2015Updated 10 years ago
- Maltego transforms for Hunchly☆17Jun 9, 2025Updated 9 months ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆48Aug 1, 2020Updated 5 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- Install guide for putting Debian GNU/Linux on a PogoPlug Pro☆10Jan 19, 2023Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- ICS TestBed Framework☆69Jan 10, 2019Updated 7 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated last month
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago