Presentation slides, blogs, and videos of my conference presentations.
☆26Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for presentation
Users that are interested in presentation are comparing it to the libraries listed below
Sorting:
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆23Jul 12, 2022Updated 3 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆66Jan 12, 2026Updated last month
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 3 months ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆96Feb 9, 2026Updated 2 weeks ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 2 years ago
- Analyze tool for windows reverser☆31Mar 6, 2023Updated 2 years ago
- Exploit for CVE-2024-27198 - TeamCity Server☆35Dec 19, 2024Updated last year
- Challenge source code and deployment scripts for UIUCTF 2022☆32Aug 9, 2022Updated 3 years ago
- ☆46Nov 10, 2025Updated 3 months ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell☆11Apr 18, 2022Updated 3 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 4 months ago
- opsi-script aka. opsi-winst and other various tools.☆10Feb 11, 2026Updated 2 weeks ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago