mbrg / defcon30Links
DEFCON30 Talk Material, References and Extra Bits
☆39Updated 3 years ago
Alternatives and similar repositories for defcon30
Users that are interested in defcon30 are comparing it to the libraries listed below
Sorting:
- ☆74Updated 3 years ago
- ☆38Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- ☆68Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- ☆70Updated 2 years ago
- ☆48Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- ☆83Updated last year
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆28Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- ☆37Updated 3 years ago
- Windows internals and exploitation tricks☆106Updated last week
- Living Off the Foreign Land setup scripts☆72Updated 8 months ago
- Windows APT Warfare, published by Packt☆75Updated 2 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- ☆88Updated 3 years ago
- ☆77Updated last year
- ☆120Updated last year
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago