mbrg / defcon30Links
DEFCON30 Talk Material, References and Extra Bits
☆39Updated 3 years ago
Alternatives and similar repositories for defcon30
Users that are interested in defcon30 are comparing it to the libraries listed below
Sorting:
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆68Updated 3 years ago
- ☆84Updated last year
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- ☆78Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Updated 3 years ago
- ☆38Updated 2 years ago
- ☆70Updated 2 years ago
- ☆37Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- ☆88Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Updated 3 years ago
- ☆49Updated 2 years ago
- Windows internals and exploitation tricks☆112Updated 3 months ago
- Living Off the Foreign Land setup scripts☆74Updated 11 months ago
- WNF Code Execution Library Using C#☆112Updated 5 years ago
- ☆86Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- ☆43Updated 3 years ago
- ☆79Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆102Updated last year
- ☆68Updated 3 years ago