h4wkst3r / Blackhat-USA-2022-Materials
Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks
☆65Updated 2 years ago
Alternatives and similar repositories for Blackhat-USA-2022-Materials
Users that are interested in Blackhat-USA-2022-Materials are comparing it to the libraries listed below
Sorting:
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆22Updated 3 years ago
- ☆38Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆27Updated 2 years ago
- ☆59Updated last year
- ☆80Updated 5 months ago
- ☆32Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- Malware Analysis tools☆26Updated 8 months ago
- A collection of red blue team staff☆46Updated last year
- ☆48Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆33Updated last month
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- ☆17Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated last year