n0x08 / ConferenceTalks
☆24Updated last year
Alternatives and similar repositories for ConferenceTalks:
Users that are interested in ConferenceTalks are comparing it to the libraries listed below
- C# User Simulation☆32Updated 2 years ago
- AMSI detection PoC☆31Updated 4 years ago
- ☆16Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Repository for LNK stuff☆29Updated 2 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Tools that trigger False Positive AV alerts☆44Updated 3 months ago
- various slides and presentations I've worked on☆18Updated 2 weeks ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Exfiltrate data from a compromised target using covert channels☆16Updated 4 years ago
- ☆37Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- ProcDot Malware Sandbox☆22Updated 4 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆12Updated 2 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆42Updated 2 years ago
- ☆23Updated 4 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆16Updated 9 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago