n0x08 / ConferenceTalksLinks
☆24Updated last year
Alternatives and similar repositories for ConferenceTalks
Users that are interested in ConferenceTalks are comparing it to the libraries listed below
Sorting:
- Continuous kerberoast monitor☆45Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- ProcDot Malware Sandbox☆24Updated 7 months ago
- Repository for LNK stuff☆30Updated 2 years ago
- ☆17Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- AMSI detection PoC☆32Updated 5 years ago
- ☆23Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- Tool to manage user privileges☆29Updated 5 years ago
- Command and Control Framework using powershell implants☆33Updated 2 weeks ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated last month
- Collection of red machine learning projects☆40Updated 3 years ago
- ☆9Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆18Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- ☆28Updated 8 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year