olafhartong / PresentationsView external linksLinks
My conference presentations
☆87Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- DEFCON 31 slide deck and video link☆66Jun 2, 2025Updated 8 months ago
- ☆12Nov 21, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77May 21, 2024Updated last year
- Syclover PPT☆30May 22, 2017Updated 8 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 9 months ago
- Test script for CVE-2020-1472 for both RPC/TCP and RPC/SMB☆61May 1, 2023Updated 2 years ago
- incident response scripts☆18Mar 4, 2019Updated 6 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- Threat Mitigation Strategies☆27Aug 18, 2025Updated 5 months ago
- ☆21Sep 23, 2025Updated 4 months ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- ☆57Mar 25, 2024Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- Malware traffic obfuscation library☆39Jul 24, 2025Updated 6 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated last month
- ☆94May 14, 2022Updated 3 years ago
- A PowerShell module that uses the WIN_API to access the registry☆14Apr 13, 2017Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- ☆20Sep 6, 2025Updated 5 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated 11 months ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- ☆43May 22, 2021Updated 4 years ago
- ☆23May 23, 2024Updated last year