muteki-apps / Security-Presentations
Collection of slides for security presentations I've given in various forums
☆14Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Security-Presentations
- ☆43Updated 3 weeks ago
- ☆28Updated 3 years ago
- General Content☆20Updated 3 months ago
- ☆34Updated 8 months ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆36Updated 7 months ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- ☆41Updated last month
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- blame Huy☆42Updated 3 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 5 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆68Updated 4 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆25Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆32Updated 3 years ago
- A tool to display Windows Event logs as they happen.☆12Updated last year
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆14Updated last year
- ☆21Updated 3 years ago
- ☆22Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Bloodhound Portable for Windows☆51Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago