mbrg / defcon30
DEFCON30 Talk Material, References and Extra Bits
☆37Updated 2 years ago
Alternatives and similar repositories for defcon30:
Users that are interested in defcon30 are comparing it to the libraries listed below
- ☆80Updated 4 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- ☆48Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆39Updated 6 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆72Updated 2 years ago
- ☆37Updated 2 years ago
- ☆87Updated 2 years ago
- Windows API header file parsing tool to generate source code for Windows API hashing☆4Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆79Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Windows internals and exploitation tricks☆93Updated 4 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 9 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆61Updated last year
- ☆38Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated this week
- ☆42Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- ☆83Updated 2 years ago