n0x08 / ConferenceTalksLinks
☆24Updated last year
Alternatives and similar repositories for ConferenceTalks
Users that are interested in ConferenceTalks are comparing it to the libraries listed below
Sorting:
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Tools that trigger False Positive AV alerts☆50Updated 8 months ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- ☆27Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Repository for LNK stuff☆31Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- ☆64Updated last year
- ☆37Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- ☆24Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- async parser for JET☆24Updated last year
- Random scripts for azure stuff☆11Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- ☆15Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆23Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago