¯\_(ツ)_/¯
Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
5
stars
written in HTML
Clear filter
Automate the creation of a lab environment complete with security tooling and logging best practices
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
Weaponized Browser-in-the-Middle (BitM) for Penetration Testers
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provi…
Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.