Projects for AWS ThreatHunting
☆21Aug 20, 2021Updated 4 years ago
Alternatives and similar repositories for aws-threathunting
Users that are interested in aws-threathunting are comparing it to the libraries listed below
Sorting:
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- This repository maintains some of the scripts made by Ebryx DevSecOps team.☆12Dec 21, 2022Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- Mindmaps for threat hunting - work in progress.☆152Mar 15, 2022Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Labs and course material for Advania course 'PowerShell Advanced Fundamentals'☆12Jan 12, 2026Updated last month
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆34Nov 4, 2018Updated 7 years ago
- ☆49Dec 11, 2025Updated 2 months ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Jan 4, 2018Updated 8 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Find and notify users in your Active Directory with weak passwords☆103Sep 4, 2021Updated 4 years ago