Slides and materials for conference presentations
☆11Jun 4, 2023Updated 2 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 29, 2026Updated last month
- ☆12Jul 18, 2018Updated 7 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Nov 20, 2021Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- ☆16Mar 19, 2020Updated 6 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Decentralized KYC Verification Process for Banks using Ethereum☆13Feb 28, 2023Updated 3 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆20Jul 8, 2020Updated 5 years ago
- A cloud-based learning management system intended for educational institutions. (Serverless Application) - AWS Amplify, React.js, GraphQL…☆18Nov 18, 2021Updated 4 years ago
- A tutorial on how to build an artificial neural network model based on URL data.☆17Aug 23, 2018Updated 7 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- Python scripts to interact with SDWAN vManage 20.3.1☆15Jul 7, 2023Updated 2 years ago
- Longlive SSH sessions!☆12Dec 31, 2018Updated 7 years ago
- Go CLI toolkit☆20Dec 18, 2023Updated 2 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- To store some CTF_reverse_bins and scripts☆11Nov 17, 2019Updated 6 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- ☆13Dec 27, 2023Updated 2 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 3 years ago
- compare an image to every frame of a video☆23Nov 23, 2021Updated 4 years ago
- Handy Anki integration for Obsidian.☆35Jan 29, 2023Updated 3 years ago
- A very simple "Nmap-like" program that can scan for hosts and open TCP ports, written in Rust.☆12Jun 24, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- ☆14Apr 4, 2019Updated 6 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- Writeup on how to access Wifi pineapple GUI through non-management APs and fuzz web app login credentials☆16Dec 1, 2021Updated 4 years ago
- window☆13Feb 24, 2017Updated 9 years ago