Presentations in different conferences
☆38Oct 17, 2019Updated 6 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated last month
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Proposing security measures and security analysis in the Fiware IoT environment.☆22Oct 4, 2018Updated 7 years ago
- Extensions to Go's testing/iotest package☆12Feb 13, 2016Updated 10 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Plugin for loading MachO kernelcache and dSYM files to Binary Ninja☆40Mar 23, 2025Updated last year
- slide☆13Oct 26, 2017Updated 8 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- encryption for humans☆17Jan 3, 2023Updated 3 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Blogging in Lisp☆17Nov 11, 2016Updated 9 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Linux driver for the Behringer BCD2000 DJ controller☆25May 16, 2025Updated 10 months ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 11 years ago
- Add lore links to emails in mutt☆11Mar 30, 2026Updated last week
- 基于深度学习的cms识别 训练集☆16Sep 22, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆132Mar 16, 2022Updated 4 years ago
- ☆12Oct 22, 2025Updated 5 months ago