Presentation slides, blogs, and videos of my conference presentations.
☆26Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for presentation
Users that are interested in presentation are comparing it to the libraries listed below
Sorting:
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- ☆46Nov 10, 2025Updated 4 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated last month
- ☆16Jan 23, 2022Updated 4 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Go bindings for YARA☆18Mar 10, 2022Updated 4 years ago
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- The Windows Malware Analysis Reversing Core Tools☆98Dec 21, 2020Updated 5 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 11 months ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- Challenge source code and deployment scripts for UIUCTF 2022☆32Aug 9, 2022Updated 3 years ago
- A few resources for fuzzing☆17Sep 25, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 6 months ago
- Crackme collections☆14May 24, 2020Updated 5 years ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 8 months ago
- ☆23Jul 3, 2022Updated 3 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Mar 12, 2026Updated last week
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆98Updated this week
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Sep 9, 2022Updated 3 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Commons utilities and tools in Golang☆14Nov 23, 2025Updated 3 months ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆68Jan 12, 2026Updated 2 months ago
- ☆10Oct 12, 2021Updated 4 years ago