My conference presentations
☆86Apr 15, 2026Updated 3 weeks ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- ☆21Sep 23, 2025Updated 7 months ago
- Still in dev mode☆12Apr 24, 2018Updated 8 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- DEFCON 31 slide deck and video link☆68Jun 2, 2025Updated 11 months ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 4 years ago
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- This repo is where I store my Threat Hunting ideas/content☆90Mar 20, 2026Updated last month
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated last month
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- ☆12Nov 21, 2023Updated 2 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆100Oct 4, 2022Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 3 weeks ago
- ☆57Mar 25, 2024Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated 4 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,182Jul 26, 2023Updated 2 years ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,411Feb 10, 2026Updated 2 months ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆357Nov 3, 2020Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year