h4wkst3r / Blackhat-USA-2022-Materials
Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks
☆65Updated 2 years ago
Alternatives and similar repositories for Blackhat-USA-2022-Materials:
Users that are interested in Blackhat-USA-2022-Materials are comparing it to the libraries listed below
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- ☆38Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- OSCP Study Guide☆40Updated 2 years ago
- vulnlab.com reaper writeup☆26Updated last year
- ☆59Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆31Updated 2 weeks ago
- ☆80Updated 5 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 10 months ago
- ☆22Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- ☆27Updated 2 years ago
- ☆84Updated 2 years ago
- ☆51Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆54Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- A collection of red blue team staff☆46Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- exfiltration/infiltration toolkit☆23Updated last year