eversinc33 / TalksLinks
Repository for slide decks of public talks I've given.
☆14Updated 2 years ago
Alternatives and similar repositories for Talks
Users that are interested in Talks are comparing it to the libraries listed below
Sorting:
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated 2 years ago
- ☆38Updated last year
- Random☆33Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 4 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- ☆25Updated 3 years ago
- ☆59Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆71Updated last week
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆37Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆24Updated 2 years ago
- terraform deployment for red team☆23Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- Some of my custom "tools".☆28Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- ☆48Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago