apolloclark / diamondsLinks
Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon
☆17Updated 8 years ago
Alternatives and similar repositories for diamonds
Users that are interested in diamonds are comparing it to the libraries listed below
Sorting:
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Ansible Provisioned Security Testing Platform☆17Updated 8 years ago
- Metasploit Framework☆25Updated 7 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Updated 8 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆23Updated 8 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Code for installing various security minded tools onto Vagrant powered virtual machines☆172Updated 10 years ago
- Write simple security regression tests for your network infrastructure.☆19Updated 12 years ago
- ☆76Updated 10 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- ☆66Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆33Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Enrich a host with open source security information☆27Updated 9 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 8 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago