☆24Feb 14, 2024Updated 2 years ago
Alternatives and similar repositories for ConferenceTalks
Users that are interested in ConferenceTalks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- ☆113Oct 10, 2022Updated 3 years ago
- Rite Of Passage ROP Injector☆35Aug 4, 2019Updated 6 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- C implementation of TOTP to generate 2FA code like Google Authentificator.☆21Jun 15, 2021Updated 4 years ago
- HTTPFuzzer is a simple python script to perform multiple fuzzing techniques for HTTP protocol☆13Aug 24, 2018Updated 7 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Jul 12, 2023Updated 2 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 8 years ago
- Simply check if a domain has been registered ( or if it is resolvable ) to determine if it's available.☆10Nov 11, 2017Updated 8 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- stm8 ida processor module☆13Nov 9, 2021Updated 4 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.☆10Dec 30, 2025Updated 2 months ago
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- ☆71Feb 6, 2025Updated last year
- Various dll hollowing techniques☆10Feb 29, 2024Updated 2 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- Open Source Trash Mail Service☆18Oct 31, 2014Updated 11 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- Reverse engineering resources for the eCOS platform.☆23Sep 26, 2024Updated last year
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago