All Projects → comaeio → Opcde

comaeio / Opcde

OPCDE Cybersecurity Conference Materials

Projects that are alternatives of or similar to Opcde

Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-90.52%)
Mutual labels:  cybersecurity, vulnerability, information-security
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (-46.47%)
Mutual labels:  incident-response, cybersecurity, information-security
quick-scripts
A collection of my quick and dirty scripts for vulnerability POC and detections
Stars: ✭ 73 (-86.43%)
Mutual labels:  vulnerability, information-security
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-90.71%)
Mutual labels:  incident-response, cybersecurity
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-95.91%)
Mutual labels:  incident-response, cybersecurity
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-93.87%)
Mutual labels:  cybersecurity, information-security
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (-76.95%)
Mutual labels:  incident-response, cybersecurity
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (-73.61%)
Mutual labels:  incident-response, cybersecurity
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-88.66%)
Mutual labels:  cybersecurity, vulnerability
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (-43.49%)
Mutual labels:  cybersecurity, information-security
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-97.4%)
Mutual labels:  cybersecurity, information-security
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+547.77%)
Mutual labels:  cybersecurity, information-security
Awesome Incident Response
A curated list of tools for incident response
Stars: ✭ 4,753 (+783.46%)
Mutual labels:  incident-response, cybersecurity
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+25.65%)
Mutual labels:  incident-response, cybersecurity
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (-21.19%)
Mutual labels:  cybersecurity, information-security
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-67.29%)
Mutual labels:  incident-response, cybersecurity
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-39.78%)
Mutual labels:  incident-response, cybersecurity
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (-86.43%)
Mutual labels:  incident-response, cybersecurity
Information Security Tasks
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-79.93%)
Mutual labels:  incident-response, information-security
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-89.03%)
Mutual labels:  cybersecurity, information-security

OPCDE

OPCDE Materials (2017-2019)

OPCDE started in 2017 and had the pleasure to welcome to below speakers since its creation.

2019

U.A.E.

  • Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos (@realmomalab)
  • Using Symbolic Execution to Root Routers - Mathy Vanhoef (@vanhoefm)
  • Evolving Attacker Techniques in Account Takeover - Philip Martin (@securityguyphil)
  • Lions at the watering hole - Andrei Boz (@dekeneas)
  • Next Gen IoT Botnets - owning 450.000 devices from a single vendor - Alex "Jay" Balan (@jaymzu)
  • Danger of using fully homomorphic encryption,a look at Microsoft SEAL - Zhiniang Peng (@edwardzpeng)
  • (SAP) Gateway to Heaven - Mathieu Geli & Dmitry Chastuhin (@gelim, @_chipik)
  • NTLM Relay Is Dead,NO, this is impossible - sanr, Yang Zhang (@by_sanr, @izykw)
  • Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software - Alex Matrosov (@matrosov)
  • Practical Uses for Memory Visualization - Ulf Frisk (@UlfFrisk)
  • Trade War: Shellcode's Wielding of Imports and Exports - Willi Ballenthin (@williballenthin)
  • WhatsApp Digger - Deemah A Alotaibi, Lamyaa S Alsaleem, Malak F Aldakheel, Sarah A Alqhtani (@_Saraque @Lamya_Alsleem @DeemaAlotaibi5 @Malakfsd)

2018

U.A.E.

  • Keynote 1 - Dan Cuthbert (@dcuthbert)
  • DPRK's eyes on mobile Spying on North Korean Defectors - Inhee Han & Jaewon Min (@boinya & @binerdd)
  • Getting Cozy with Auditing on MacOS … The Good, the Bad, & the Ugly - Patrick Wardle (@patrickwardle)
  • Improved KRACK Attacks Against WPA2 Implementations - Mathy Vanhoef (@vanhoefm)
  • Revisiting the Security of NVIDIA Tegra Platform - nforest (@nforest_)
  • Security Response in Todays Ecosystem - Philip Misner (@phillip_misner)
  • Skorpio Advanced Binary Instrumentation Framework - Nguyen Anh Quynh (@capstone_engine)
  • Surprise Supplies - Warren Mercer & Paul Rascagneres (@SecurityBeard & @r00tbsd)
  • The Life & Death of Kernel Object Abuse by Type Isolation - Saif ElSheri Ian Kronquist (@IanKronquist )
  • UEFI BIOS firmware analysis at scale - Oleksandr Bazhaniuk (@ABazhaniuk)

Kenya

  • Program Analysis on Smart Contracts - JP Smith, Trail Of Bits (@japesinator)
  • A Walk With Shannon: A walkthrough of a PWN2OWN Baseband exploit - Amat Cama, Independant (@amatcama)
  • Reversing the Octagon: Next-Gen Windows Security - Alex Ionescu, Dave Weston (@aionescu & @dwizzzleMSFT)
  • The Baseband Basics: Understanding, Debugging and Pwning the Mediatek Communication Processor - Nitay Artenstein, Charles Muiruri (@nitayart & @icrackthecode)
  • You and your research - Saif ElSherei (@Saif_Sherei)

2017

U.A.E.

  • Keynote 1 - Revisiting the state - Maarten Van Horenbeeck (@maartenvhb)
  • Keynote 2 - Wim Remes (@wimremes)
  • The Blackbox of DPAPI: the gift that keeps on giving - Bartosz Inglot (@BartInglot)
  • Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine - Abdul-Aziz Hariri (@abdhariri), Jasiel Spelman (@WanderingGlitch), Brian Gorence
  • From mimikatz to kekeo, passing by new Microsoft security technologies - Benjamin Delpy (@gentilkiwi)
  • Agentless Post Exploitation on Device Guarded Systems - Christopher Truncer (@ChrisTruncer)
  • Security Research and Development with LLVM - Andrew Reiter (@andrew_opcde)
  • Supply Chainsaw: Practical software supply chain attacks - Matt Weeks (@scriptjunkie1)
  • Hacking wireless SCADA systems - Elena Feldman
  • Exploring Your System Deeper - Oleksandr Bazhaniuk (@ABazhaniuk)
  • Windows Operating System Archaeology - Matt Nelson (@enigma0x3)
  • Blinded Random Block Corruption - Rodrigo Branco (@bsdaemon)
  • Practical attacks against Digital Wallet - Loic Falletta (@zavidan)
  • 15 ways to break RSA security - Renaud Lifchitz (@nono2357)
  • Stranger Danger - Mohamed Saher (@halsten), Ahmed Garhy (@9ee1), Nikita Tarakanov (@NTarakanov)
  • Lighting Talk
    • Our Financial System is under Attack - Matt Suiche (@msuiche) & @x0rz
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].