Conference presentations
☆60Oct 22, 2025Updated 6 months ago
Alternatives and similar repositories for conference-presentations
Users that are interested in conference-presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- ☆19Sep 13, 2021Updated 4 years ago
- SQL, IIS, Oh My...☆21Feb 24, 2025Updated last year
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Config files for my GitHub profile.☆14May 7, 2023Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 10 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆11May 7, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- Incident Response documents and tooling☆115Dec 23, 2025Updated 4 months ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Visual Studio Code extension for MITRE ATT&CK☆56May 1, 2026Updated 2 weeks ago
- ☆14Mar 5, 2021Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- ☆76Oct 16, 2022Updated 3 years ago
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆15Dec 6, 2023Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆46Apr 14, 2024Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 11 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆14Jun 12, 2024Updated last year
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆487Nov 21, 2024Updated last year
- ☆61Jun 24, 2023Updated 2 years ago
- ☆12May 13, 2024Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆49Feb 27, 2026Updated 2 months ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago