Slides for the talk we presented as UniPi at DefCon's Red Team Village
☆23Aug 14, 2022Updated 3 years ago
Alternatives and similar repositories for DC30-PhineasTalk
Users that are interested in DC30-PhineasTalk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- ☆13May 27, 2020Updated 5 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- ☆18Jan 9, 2026Updated 2 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Django QuerySet.annotate(), aggregate(), extra() SQL 注入☆25May 31, 2022Updated 3 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- ☆33Sep 24, 2021Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- ☆11Apr 17, 2017Updated 8 years ago
- A self-hosted Armory implementation.☆23Jan 1, 2026Updated 2 months ago
- miscellaneous codes☆36Sep 24, 2023Updated 2 years ago
- it is very good☆515Dec 20, 2022Updated 3 years ago
- Script used to track airtags (using Apple's Find My-network through the Find My-app on macOS) and save the location history data to CSV f…☆14Nov 19, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆89Jun 24, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- My new C2 framework☆41Nov 5, 2022Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Research on Commercial Space Projects☆18Oct 29, 2020Updated 5 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Jan 3, 2023Updated 3 years ago