All Projects → averagesecurityguy → presentations

averagesecurityguy / presentations

Licence: other
My Presentations in PDF

Projects that are alternatives of or similar to presentations

Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+425.93%)
Mutual labels:  post-exploitation, metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+1670.37%)
Mutual labels:  post-exploitation, metasploit
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+614.81%)
Mutual labels:  post-exploitation, metasploit
Venom
venom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+3248.15%)
Mutual labels:  post-exploitation, metasploit
Msf Auxiliarys
My collection of metasploit auxiliary post-modules
Stars: ✭ 183 (+577.78%)
Mutual labels:  post-exploitation, metasploit
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+588.89%)
Mutual labels:  post-exploitation, metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+2125.93%)
Mutual labels:  post-exploitation, metasploit
htrgouvea.github.io
My past public researches are archived here
Stars: ✭ 18 (-33.33%)
Mutual labels:  research
UAV-Stereo-Vision
A program for controlling a micro-UAV for obstacle detection and collision avoidance using disparity mapping
Stars: ✭ 30 (+11.11%)
Mutual labels:  research
cry
SageMath/Python Toolkit for Cryptanalytic Research
Stars: ✭ 23 (-14.81%)
Mutual labels:  research
OffensiveAutoIt
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+1162.96%)
Mutual labels:  post-exploitation
trackswitch.js
A Versatile Web-Based Audio Player for Presenting Scientific Results
Stars: ✭ 39 (+44.44%)
Mutual labels:  research
LudiiExampleAI
Project with examples for the implementation of third-party AI algorithms / agents for the Ludii general game system.
Stars: ✭ 20 (-25.93%)
Mutual labels:  research
sjm
Sancho McCann's PhD Thesis Research Code
Stars: ✭ 24 (-11.11%)
Mutual labels:  research
GitHubDropBox
A tutorial for how to combine GitHub and DropBox in a research project
Stars: ✭ 28 (+3.7%)
Mutual labels:  research
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (+74.07%)
Mutual labels:  post-exploitation
p2psec
research on privacy and security in p2p and decentralised systems
Stars: ✭ 38 (+40.74%)
Mutual labels:  research
euro-calliope
A workflow to build models of the European electricity system for Calliope.
Stars: ✭ 23 (-14.81%)
Mutual labels:  research
SBD
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-14.81%)
Mutual labels:  post-exploitation
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (+37.04%)
Mutual labels:  post-exploitation

presentations

My Presentations in PDF

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].