kgretzky / talksView external linksLinks
Slides and videos from talks given at cons
☆25Jun 19, 2025Updated 7 months ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- ☆31Sep 23, 2022Updated 3 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- ☆15Jan 26, 2023Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Dec 13, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- A malicous Golang Package☆15Apr 21, 2025Updated 9 months ago
- ☆16May 25, 2023Updated 2 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 8 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated 2 weeks ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- ☆20Nov 5, 2025Updated 3 months ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Ready to go Phishing Platform☆57Oct 15, 2024Updated last year
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆23Mar 10, 2025Updated 11 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated last year
- A simple website to act as a store for havoc modules and extensions☆28Jan 20, 2025Updated last year
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- ☆34Apr 5, 2017Updated 8 years ago
- ☆25Apr 28, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Solana SPL Token launch website, Liquidity Pool creation - Create own Solana SPL Tokens for free☆17Mar 20, 2025Updated 10 months ago
- PowerShell script to generate user accounts in Active Directory for a test lab environment☆31Oct 21, 2018Updated 7 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Dec 23, 2020Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago