jfmaes / talks-cons
aggregated repo for all conferences and talks I am giving
☆17Updated 3 years ago
Alternatives and similar repositories for talks-cons:
Users that are interested in talks-cons are comparing it to the libraries listed below
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- ☆24Updated 3 years ago
- ☆27Updated 5 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 10 months ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- ☆37Updated last year
- ☆37Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- ☆22Updated 11 months ago
- ☆34Updated 2 years ago
- ☆18Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆54Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆19Updated 3 years ago