Presentations in different conferences
☆38Oct 17, 2019Updated 6 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- PoC || GTFO Issues☆70Feb 12, 2020Updated 6 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Feb 5, 2018Updated 8 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- ☆27Mar 3, 2026Updated 2 weeks ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated 3 weeks ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Proposing security measures and security analysis in the Fiware IoT environment.☆22Oct 4, 2018Updated 7 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Plugin for loading MachO kernelcache and dSYM files to Binary Ninja☆40Mar 23, 2025Updated 11 months ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Pauta e programação do canal no Youtube Unix Load On https://www.youtube.com/UnixLoadOn☆12Jan 8, 2026Updated 2 months ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 10 years ago
- Add lore links to emails in mutt☆11Feb 9, 2026Updated last month
- Mirror of Linus Torvald's Kernel Tree☆14Oct 30, 2025Updated 4 months ago
- 基于深度学习的cms识别 训练集☆16Sep 22, 2018Updated 7 years ago
- A curated list of websites and apps to help you practice hacking☆23Oct 15, 2019Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆132Mar 16, 2022Updated 4 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- Crypt::Curve25519☆12Jan 6, 2021Updated 5 years ago