tyranid / infosec-presentationsLinks
A repository of previous info-sec presentations I've presented.
☆161Updated 11 months ago
Alternatives and similar repositories for infosec-presentations
Users that are interested in infosec-presentations are comparing it to the libraries listed below
Sorting:
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆123Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 4 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Proof-of-concept code for various bugs☆112Updated 11 months ago
- ☆36Updated 7 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- ☆62Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated 11 months ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147Updated 3 years ago
- ☆268Updated 2 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆145Updated 5 years ago
- ☆25Updated 5 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆64Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆148Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- ☆211Updated 3 months ago
- ☆52Updated 4 years ago
- VerSprite Security Research☆171Updated 2 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 3 years ago