aidansteele / vpcshark
An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier
☆15Updated last month
Alternatives and similar repositories for vpcshark:
Users that are interested in vpcshark are comparing it to the libraries listed below
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 7 months ago
- ☆30Updated 2 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆29Updated 3 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- This is a custom SSM agent which is sorta functional☆17Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Dont Gamble with Risk☆14Updated 10 months ago
- ☆58Updated last year
- ☆41Updated 9 months ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 9 months ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- ☆16Updated 2 months ago
- Zone transfers for rwhois☆20Updated 5 years ago
- ☆18Updated 2 years ago
- ☆12Updated 2 months ago
- ☆12Updated 2 months ago
- ☆15Updated 2 years ago
- ☆14Updated last month
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆18Updated 4 months ago
- C# User Simulation☆32Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆17Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Cobalt Strike log state tracking, parsing, and storage☆22Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated last year