apolloclark / diamondsLinks
Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon
☆17Updated 9 years ago
Alternatives and similar repositories for diamonds
Users that are interested in diamonds are comparing it to the libraries listed below
Sorting:
- Code for installing various security minded tools onto Vagrant powered virtual machines☆172Updated 11 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 10 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Ansible Provisioned Security Testing Platform☆17Updated 9 years ago
- A repository for large scripts from my book.☆161Updated 4 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Updated 6 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 8 years ago
- A Github organization reconnaissance tool.☆218Updated 2 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 9 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 7 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Updated 8 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 7 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 5 years ago
- ☆90Updated 3 months ago
- ☆75Updated 11 years ago
- ☆78Updated 10 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆168Updated 8 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 9 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆231Updated 9 years ago
- Automated digital reconnaissance☆203Updated 3 years ago
- Store Burp data and collaborate via git☆53Updated 6 years ago
- Minion☆355Updated 6 years ago