An example of a vulnerable slack bot that runs in AWS lambda.
☆19Jul 15, 2017Updated 8 years ago
Alternatives and similar repositories for poor-webhook
Users that are interested in poor-webhook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- ☆26Dec 8, 2025Updated 3 months ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Tool for generating Python AWS Lambda zip files☆10Jul 8, 2019Updated 6 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Command-line option parser.☆46Sep 11, 2016Updated 9 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Statically Compiled Tools that could be used in engagements☆17Aug 29, 2022Updated 3 years ago
- ConnectWise-CRU☆14Mar 11, 2024Updated 2 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- Node.js package for creating Slackbot lambdas☆43Dec 18, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Mar 16, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Go API to interact with radare2☆36Jan 15, 2026Updated 2 months ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Tumbleweed verbs - a 9 Verb adventure game GUI for AGS☆14Sep 7, 2025Updated 6 months ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago
- Documentation on using the built-in Python debugger, PDB.☆23Dec 8, 2022Updated 3 years ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Jan 28, 2016Updated 10 years ago
- ☆13Apr 18, 2023Updated 2 years ago
- Mal4s is a free open source data visualization tool designed to make it easy to see clusters of related Internet resources.☆32Jan 20, 2026Updated 2 months ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- AWS CloudWatch client library to send metrics conveniently and efficiently☆12Feb 10, 2023Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- ☆22Apr 10, 2020Updated 5 years ago
- A collection of best practices that we have learnt so far☆11Apr 19, 2014Updated 11 years ago
- 🌃 Start and control a Tor instance.☆12Apr 9, 2022Updated 3 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago