My conference presentations
☆87Nov 11, 2025Updated 5 months ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- ☆21Sep 23, 2025Updated 6 months ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- DEFCON 31 slide deck and video link☆68Jun 2, 2025Updated 10 months ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 4 years ago
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repo is where I store my Threat Hunting ideas/content☆89Mar 20, 2026Updated 3 weeks ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated 2 weeks ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- ☆12Nov 21, 2023Updated 2 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆99Oct 4, 2022Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Apr 9, 2026Updated last week
- ☆57Mar 25, 2024Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated 3 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,178Jul 26, 2023Updated 2 years ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆447Aug 7, 2020Updated 5 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,394Feb 10, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆356Nov 3, 2020Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago