mbrg / defcon30
DEFCON30 Talk Material, References and Extra Bits
☆37Updated 2 years ago
Alternatives and similar repositories for defcon30:
Users that are interested in defcon30 are comparing it to the libraries listed below
- ☆38Updated last year
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Windows API header file parsing tool to generate source code for Windows API hashing☆4Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆60Updated last year
- ☆86Updated 2 years ago
- Windows internals and exploitation tricks☆92Updated 3 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆69Updated last year
- It's pointy and it hurts!☆123Updated 2 years ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆48Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 8 months ago
- quASAR: ASAR manipulation made easy☆25Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated 2 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆122Updated 2 years ago
- Find DLLs with RWX section☆76Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- ☆108Updated 3 months ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 3 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆96Updated 10 months ago
- A quick example of the Hells Gate technique in Nim☆94Updated 3 years ago
- ☆38Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆78Updated 2 years ago
- Find .net assemblies locally☆105Updated 2 years ago
- ☆76Updated 11 months ago
- ☆66Updated 2 years ago