byt3bl33d3r / tailscalesdLinks
Prometheus Service Discovery for Tailscale (Python Edition)
☆25Updated 3 years ago
Alternatives and similar repositories for tailscalesd
Users that are interested in tailscalesd are comparing it to the libraries listed below
Sorting:
- Configurable, Community driven, HTTP C2 Profile☆22Updated 3 weeks ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last month
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆12Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆11Updated 3 months ago
- ☆20Updated 5 years ago
- ☆12Updated 3 years ago
- ☆12Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆18Updated last year
- Standardizing Security Titles☆13Updated 2 years ago