Conference presentations
☆60Oct 22, 2025Updated 5 months ago
Alternatives and similar repositories for conference-presentations
Users that are interested in conference-presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- A community sourced information store about applications☆21Dec 5, 2022Updated 3 years ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆17Nov 7, 2025Updated 5 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 8 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Apr 1, 2026Updated last week
- A set of tools for managing and diagnosing Intune on Windows endpoints☆52Feb 25, 2025Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- Incident Response documents and tooling☆113Dec 23, 2025Updated 3 months ago
- Examine Chrome extensions for security issues☆97Nov 16, 2025Updated 4 months ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Visual Studio Code extension for MITRE ATT&CK☆56Jul 3, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- ☆77Oct 16, 2022Updated 3 years ago
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 4 months ago
- ☆15Dec 20, 2022Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆46Apr 14, 2024Updated last year
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- ☆70May 5, 2021Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆487Nov 21, 2024Updated last year
- ☆60Jun 24, 2023Updated 2 years ago