malwarejake-public / conference-presentationsView external linksLinks
Conference presentations
☆60Oct 22, 2025Updated 3 months ago
Alternatives and similar repositories for conference-presentations
Users that are interested in conference-presentations are comparing it to the libraries listed below
Sorting:
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Presentations from Conferences☆30Sep 14, 2024Updated last year
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated 11 months ago
- ☆12Nov 25, 2020Updated 5 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 7 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated 11 months ago
- ☆18Jun 21, 2019Updated 6 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- ☆28Sep 4, 2024Updated last year
- Monitor areas on static map services & log new images☆23Aug 22, 2019Updated 6 years ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Feb 23, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆134Sep 8, 2025Updated 5 months ago
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Jan 29, 2026Updated 2 weeks ago
- ☆67May 5, 2021Updated 4 years ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Dec 7, 2025Updated 2 months ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆35Jul 12, 2025Updated 7 months ago
- ☆61Jun 24, 2023Updated 2 years ago
- DEFCON 31 slide deck and video link☆66Jun 2, 2025Updated 8 months ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month