romanzaikin / From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop
From Zero to Hero in Web Security Research - Def Con 29 Workshop
☆36Updated 7 months ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop:
Users that are interested in From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop are comparing it to the libraries listed below
- A repo to support the book☆106Updated 3 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆42Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 6 months ago
- Posts about different topics☆36Updated 11 months ago
- Vulnerabilities, exploits, and PoCs☆35Updated 2 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆51Updated 4 months ago
- ☆61Updated 8 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- isodump - ISO dump utility☆40Updated 5 years ago
- ☆77Updated 5 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ☆28Updated 2 months ago
- A repository of previous info-sec presentations I've presented.☆159Updated 4 months ago
- ☆69Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- king of the hill cybersecurity competition☆28Updated 2 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- My thoughts from going through the OSEP materials.☆20Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆107Updated 3 months ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆33Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago