psylinux / PresentationsLinks
Some of my presentations and published articles in different conferences
☆18Updated 4 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- ☆45Updated 4 years ago
- ☆12Updated 5 years ago
- An application to test windows and linux shellcodes☆93Updated 11 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆82Updated last month
- ☆65Updated 4 years ago
- ☆13Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Posts about different topics☆40Updated 2 months ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 7 months ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- ☆48Updated last month
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆64Updated last week
- Practice Labs☆100Updated 4 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- ☆19Updated 4 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- A repo to support the book☆110Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- ☆80Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- ☆33Updated last year
- ☆42Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆24Updated 4 months ago