☆25Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for AWSCloudSimulation
Users that are interested in AWSCloudSimulation are comparing it to the libraries listed below
Sorting:
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Create Users in Active Directory This script creates 270 + users in Active Directory.☆19Oct 20, 2020Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- A tool for finding vulnerable libwebp(CVE-2023-4863)☆21Oct 7, 2023Updated 2 years ago
- Tunnel SSH and other protocols over HTTP☆29Apr 22, 2017Updated 8 years ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- A tool to enumerate network services☆24Oct 30, 2019Updated 6 years ago
- Reverse Shell as a Service☆66Nov 9, 2020Updated 5 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- 各端、平台快速消息通知程序,支持配置文件形式或API调用☆32Oct 22, 2024Updated last year
- ☆34May 4, 2022Updated 3 years ago
- ☆27Aug 11, 2020Updated 5 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- ☆148Feb 17, 2022Updated 4 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆28Mar 16, 2024Updated last year
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- ☆35Sep 13, 2022Updated 3 years ago