Some talks about security
☆12Nov 20, 2020Updated 5 years ago
Alternatives and similar repositories for Talks
Users that are interested in Talks are comparing it to the libraries listed below
Sorting:
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- Some .ps1 scripts for pentesting☆140Jan 6, 2026Updated 2 months ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago