Slides from previous conference talks
☆41May 13, 2017Updated 8 years ago
Alternatives and similar repositories for Conference-Talks
Users that are interested in Conference-Talks are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Decrypt MITM SSL RDP and save to pcap☆53May 1, 2014Updated 11 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Dec 3, 2016Updated 9 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- source&exe☆38Jul 18, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Aug 9, 2017Updated 8 years ago
- ☆35Jul 13, 2016Updated 9 years ago
- ☆22May 20, 2016Updated 9 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆35Feb 20, 2018Updated 8 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Apr 18, 2018Updated 7 years ago
- Running CVE-2017-8759 exploit sample.☆256Jan 23, 2020Updated 6 years ago