appsecco / datasploit-ansibleLinks
Ansible Playbook for setting up Datasploit
☆14Updated 8 years ago
Alternatives and similar repositories for datasploit-ansible
Users that are interested in datasploit-ansible are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆25Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Some simple and useful tools☆15Updated 7 years ago
- ☆25Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- ☆50Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Write simple security regression tests for your network infrastructure.☆19Updated 12 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Tools for use with phishing frenzy☆11Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Source Code Intelligence☆30Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago