appsecco / datasploit-ansibleLinks
Ansible Playbook for setting up Datasploit
☆14Updated 9 years ago
Alternatives and similar repositories for datasploit-ansible
Users that are interested in datasploit-ansible are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆26Updated 3 months ago
- ☆25Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Websocket based egress tester☆20Updated 9 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Write simple security regression tests for your network infrastructure.☆19Updated 13 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 10 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 9 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Updated 8 years ago
- Store Burp data and collaborate via git☆53Updated 6 years ago
- ☆22Updated 8 years ago
- ☆27Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- ☆61Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago