CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data
☆18Nov 18, 2021Updated 4 years ago
Alternatives and similar repositories for isolated_network_experiment
Users that are interested in isolated_network_experiment are comparing it to the libraries listed below
Sorting:
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- ☆12May 2, 2023Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- Ruby library for interacting with Bugcrowd's VRT☆14Aug 19, 2025Updated 6 months ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Work with the AWS IP address ranges in native Python.☆13Sep 21, 2023Updated 2 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 3 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 6 years ago
- Scripts to quickly fix security and compliance issues☆106Nov 22, 2023Updated 2 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- AWS managed IAM policies☆128Dec 6, 2021Updated 4 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Lab environment to accompany Boundary Vault Integration Quickstart Learn tutorial.☆22Nov 25, 2024Updated last year
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Mar 23, 2024Updated last year
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Generate IaC scripts from existing AWS resources with temporary security credentials☆29Jan 5, 2026Updated last month
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆22Jun 8, 2021Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- An Amazon OSINT scraper for potential scam accounts☆33Jan 17, 2019Updated 7 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Jun 6, 2023Updated 2 years ago
- ☆28Jun 12, 2017Updated 8 years ago
- ☆33May 19, 2024Updated last year
- ☆13Jun 8, 2023Updated 2 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- A collection of roughly average Cloud9 IDE tips and tricks☆29Sep 25, 2020Updated 5 years ago
- Censors or hides shell / Bash / console output based on defined patterns - great for hiding secrets in demos!☆41Apr 22, 2021Updated 4 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago