c2theg / srvBuilds
scripts to setup servers, as quickly as possible
☆9Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for srvBuilds
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- ☆10Updated 3 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated 11 months ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- ☆18Updated 12 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆30Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆12Updated 3 weeks ago