DEFCON30 Talk Material, References and Extra Bits
☆38Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for defcon30
Users that are interested in defcon30 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- ☆18Mar 15, 2026Updated last week
- ☆23Jul 28, 2023Updated 2 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Feb 25, 2023Updated 3 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- ☆11Nov 27, 2021Updated 4 years ago
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,133Dec 21, 2025Updated 3 months ago
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 3 months ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- ☆20May 30, 2025Updated 9 months ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated 2 years ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- Some crazy experiments about using a FPGA to transmit a TV signal old-style☆13Oct 13, 2018Updated 7 years ago
- Maubot plugin to moderate NSFW images☆10Feb 16, 2026Updated last month
- MAPS cloud scanner and response parser for Microsoft Defender research.☆86Feb 19, 2026Updated last month
- PUSH check client examples☆11Aug 1, 2024Updated last year
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 9 months ago
- GrapheneOS Mastodon server☆16Updated this week
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- ☆12Nov 1, 2022Updated 3 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,373Mar 9, 2026Updated 2 weeks ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- HTB writeup downloader☆24Aug 11, 2022Updated 3 years ago
- ☆53Oct 21, 2024Updated last year
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆115Aug 31, 2024Updated last year
- Materials for my DMA attacks talk and a collection of related links☆64Jun 12, 2024Updated last year