sneakid / DC30-PhineasTalkView external linksLinks
Slides for the talk we presented as UniPi at DefCon's Red Team Village
☆23Aug 14, 2022Updated 3 years ago
Alternatives and similar repositories for DC30-PhineasTalk
Users that are interested in DC30-PhineasTalk are comparing it to the libraries listed below
Sorting:
- ☆19Jul 9, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆18Jan 9, 2026Updated last month
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Oct 10, 2022Updated 3 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- Spring Boot Log4j - CVE-2021-44228 Docker Lab☆28Dec 17, 2021Updated 4 years ago
- Django QuerySet.annotate(), aggregate(), extra() SQL 注入☆24May 31, 2022Updated 3 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- ☆38Jan 6, 2025Updated last year
- ☆33Feb 26, 2022Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- ☆34Jul 6, 2015Updated 10 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- miscellaneous codes☆36Sep 24, 2023Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆39Oct 6, 2021Updated 4 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Jun 24, 2022Updated 3 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆166Jan 30, 2021Updated 5 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- ☆10Jul 8, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ☆13Mar 28, 2024Updated last year