4ndronicus / pros-vs-joesLinks
Scripts used in our HackWest Pros vs Joes event
☆14Updated 7 years ago
Alternatives and similar repositories for pros-vs-joes
Users that are interested in pros-vs-joes are comparing it to the libraries listed below
Sorting:
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 3 months ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 6 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 11 months ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- ☆200Updated 3 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- ☆54Updated 4 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 7 years ago
- ☆73Updated 7 years ago
- 504 VSAgent☆23Updated 7 years ago
- ☆26Updated 7 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆166Updated 6 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 7 years ago
- ☆232Updated 5 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆231Updated 3 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Kill Chain Matrix -->>☆38Updated 6 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆168Updated 7 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago