4ndronicus / pros-vs-joesLinks
Scripts used in our HackWest Pros vs Joes event
☆14Updated 7 years ago
Alternatives and similar repositories for pros-vs-joes
Users that are interested in pros-vs-joes are comparing it to the libraries listed below
Sorting:
- Notes, Slides, Comments and Commands on How to Win CCDC☆137Updated 9 months ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- ☆54Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- ☆73Updated 7 years ago
- Professionally Evil Web Application Penetration Testing 101☆148Updated 5 years ago
- ☆201Updated 4 years ago
- 504 VSAgent☆25Updated 7 years ago
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆159Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆231Updated 4 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆103Updated 3 years ago
- ☆194Updated last year
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Kill Chain Matrix -->>☆38Updated 6 years ago
- ☆233Updated 5 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Updated 7 years ago
- An ELK environment containing interesting security datasets.☆137Updated 5 years ago