My talks...
☆25Feb 27, 2025Updated last year
Alternatives and similar repositories for Talks
Users that are interested in Talks are comparing it to the libraries listed below
Sorting:
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Mar 27, 2023Updated 2 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- Creating a Bind Shell in C☆18Aug 21, 2023Updated 2 years ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- 🌎 Multi-threaded top level domain fuzzer. Discover already existed and available domains and subdomains!☆19Jan 12, 2026Updated last month
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- Rapidly enumerate subdomains and domains using rapiddns.io.☆82Apr 22, 2022Updated 3 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- ☆20Aug 11, 2024Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- ☆21Oct 28, 2021Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- 一款简单的qvm管理工具☆24Aug 5, 2023Updated 2 years ago
- Find related domains of a given domain.☆104Aug 5, 2023Updated 2 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- ☆25Dec 28, 2023Updated 2 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- Curated list of Meta (formerly Facebook) owned IT assets☆56Jul 20, 2025Updated 7 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆29Nov 7, 2023Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆236Feb 1, 2022Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- assets for www.hahwul.com☆24Updated this week
- ☆47May 8, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Security Advisories☆35Feb 8, 2026Updated 3 weeks ago
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- Search for sensitive data in Postman public library.☆214Aug 28, 2025Updated 6 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago