tijme / conferences
Some of the presentations, workshops, and labs I gave at public conferences.
☆21Updated last week
Related projects: ⓘ
- ☆45Updated last year
- A pure C version of SymProcAddress☆23Updated 6 months ago
- ☆57Updated 9 months ago
- ☆47Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆15Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆25Updated last week
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 2 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 4 months ago
- ☆27Updated 3 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated 11 months ago
- Utilities for obfuscating shellcode☆38Updated 2 months ago
- ☆18Updated this week
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 9 months ago
- Threadless Injection Payload Toolkit☆11Updated 11 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆72Updated last month
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- maldev obviously☆23Updated 2 months ago
- A care package of useful bofs for red team engagments☆47Updated last year
- ☆23Updated last year
- ☆50Updated this week
- Python module for running BOFs☆63Updated last year
- Detect userland hooks placed by AV/EDR☆27Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32Updated 3 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆18Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Attack chain emulator. Write recipes for initial access easily☆19Updated last year