Vagrant provisioning scripts to create a simulated network environment for tabletop exercises
☆43Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for tabletop-lab-creation
Users that are interested in tabletop-lab-creation are comparing it to the libraries listed below
Sorting:
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本☆19Apr 1, 2025Updated 11 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆84Feb 14, 2024Updated 2 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 8 months ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆30Mar 18, 2025Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- D2R MapHack☆12Jun 10, 2022Updated 3 years ago
- A PowerShell module for the Defender XDR portal☆84Updated this week
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- Efficiently manage and track your job application history☆13May 1, 2025Updated 10 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Ready-made Windows Sandbox launch profiles and scripts that automate the routine☆18Feb 1, 2023Updated 3 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- My dotfiles☆10Jul 31, 2024Updated last year
- ☆15Aug 5, 2025Updated 7 months ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- ☆43Sep 28, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Redis RCE through Lua Sandbox Escape vulnerability☆10Sep 2, 2022Updated 3 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆22Mar 17, 2025Updated 11 months ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated last month
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- ☆13May 30, 2025Updated 9 months ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago