byt3bl33d3r / tailscalesdLinks
Prometheus Service Discovery for Tailscale (Python Edition)
☆26Updated 3 years ago
Alternatives and similar repositories for tailscalesd
Users that are interested in tailscalesd are comparing it to the libraries listed below
Sorting:
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- A Visual Studio Code Extension agent for Mythic C2☆72Updated last year
- WMI SA stuffs☆30Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Ansible role to deploy RedELK server☆19Updated 2 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- wsnet☆27Updated 2 months ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- RDP Checker☆65Updated last year
- ☆18Updated 5 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- ☆12Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 5 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago