Cloudformation Template to Launch the SOC from Kali Purple
☆54Dec 8, 2023Updated 2 years ago
Alternatives and similar repositories for kalisoc
Users that are interested in kalisoc are comparing it to the libraries listed below
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆38Dec 28, 2024Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Repository for Ludus french templates☆21Mar 1, 2026Updated last week
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Just another AD training, but free.☆16Aug 9, 2025Updated 7 months ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- A walkthrough of creating and using the Azure environment and Microsoft Sentinel to track attacks and plot attacks on a live map.☆23Mar 26, 2023Updated 2 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- The TCP Scanner☆26Oct 4, 2022Updated 3 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆25Mar 1, 2026Updated last week
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 7 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago