https://github.com/mbrg/defcon30
DEFCON30 Talk Material, References and Extra Bits
https://github.com/mbrg/defcon30
appsec defcon defcon30 hacking lowcode nocode pentesting redteaming
Last synced: 7 months ago
JSON representation
DEFCON30 Talk Material, References and Extra Bits
- Host: GitHub
- URL: https://github.com/mbrg/defcon30
- Owner: mbrg
- License: mit
- Created: 2022-08-09T23:14:05.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-10-30T10:21:45.000Z (about 3 years ago)
- Last Synced: 2024-05-09T00:03:03.392Z (over 1 year ago)
- Topics: appsec, defcon, defcon30, hacking, lowcode, nocode, pentesting, redteaming
- Homepage:
- Size: 7.3 MB
- Stars: 35
- Watchers: 4
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
- License: license
Awesome Lists containing this project
README
# DEFCON30 Talk Materials
[](https://github.com/mbrg)
[](https://twitter.com/intent/follow?screen_name=mbrg0)
[](mailto:michael.bargury@owasp.org)
Welcome!
In this repo you'll find talk materials for:
- [No-Code Malware: Windows 11 At Your Service](No_Code_Malware/)
- [Low Code High Risk: Enterprise Domination via Low Code Abuse](Low_Code_High_Risk/)
Quick tool access:
[](https://github.com/mbrg/power-pwn) [Power-pwn](https://github.com/mbrg/power-pwn) - repurpose Microsoft-trusted executables, service accounts and cloud services to power a malware operation
[](https://github.com/mbrg/powerful) [Powerful](https://github.com/mbrg/powerful) - install a backdoor on O365 Power Platform enabling creating, triggering and deleting any arbitrary automation
[](https://github.com/mbrg/zapcreds) [ZapCreds](https://github.com/mbrg/zapcreds) - scan Zapier for shared credentials ready for exploit
What you'll find here:
- [x] Recommended pre-reading for both talks
- [x] Talk abstracts
- [x] Contact details
- [x] Links to demos on YouTube, articles and references
- [x] Source code for everything
- [x] The slides
- [x] Video recordings
Stay tuned. Enjoy!