Some talks about security
☆12Nov 20, 2020Updated 5 years ago
Alternatives and similar repositories for Talks
Users that are interested in Talks are comparing it to the libraries listed below
Sorting:
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- ☆16Aug 2, 2018Updated 7 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Mar 7, 2023Updated 2 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Exploits, Exploits, Exploits and more Exploits!☆34Nov 7, 2020Updated 5 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Python3 Metasploit automation library☆24Dec 8, 2022Updated 3 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 6 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- ☆36Oct 27, 2019Updated 6 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- DEFCON 27 slides and workshop materials.☆127Jun 29, 2020Updated 5 years ago
- A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.☆77Feb 23, 2020Updated 6 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Jul 20, 2020Updated 5 years ago