S4kur4 / AutoDeployCuckooLinks
Automatically deploy a Cuckoo sandbox
☆23Updated 2 years ago
Alternatives and similar repositories for AutoDeployCuckoo
Users that are interested in AutoDeployCuckoo are comparing it to the libraries listed below
Sorting:
- Really can protect from ransomware encryption?☆46Updated last year
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- ☆41Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆51Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 3 years ago
- ☆34Updated 2 years ago
- ☆160Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 4 months ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated 3 weeks ago
- Easy to configure Honeypot for Blue Team☆41Updated last month
- Commands used in Windows penetration tests☆53Updated 3 years ago
- ☆13Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)☆79Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Linux Persistence Toolkit☆61Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Nmap script to detect a Microsoft Exchange instance version with OWA enabled.☆82Updated this week
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 3 years ago
- ☆68Updated 4 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- ☆119Updated 2 years ago