appsecco / datasploit-ansibleLinks
Ansible Playbook for setting up Datasploit
☆14Updated 9 years ago
Alternatives and similar repositories for datasploit-ansible
Users that are interested in datasploit-ansible are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆26Updated last month
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- ☆22Updated 7 years ago
- ☆25Updated 8 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Faraday Continuous Scanning☆34Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- Websocket based egress tester☆20Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Harbinger Threat Intelligence☆83Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Docker Automated Build for Security Testing Tools☆14Updated 3 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- ☆19Updated 4 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Updated 7 years ago
- integrating bro into yara☆33Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 8 years ago