Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.
☆18Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for Terraform_DigitalOcean_Scripts
Users that are interested in Terraform_DigitalOcean_Scripts are comparing it to the libraries listed below
Sorting:
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Spin up a Digital Ocean droplet using Terraform and Ansible☆12Oct 22, 2021Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- ☆65Jan 17, 2026Updated 2 months ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Mar 12, 2026Updated last week
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- AggressorScript-RunDumpHash☆19Oct 9, 2019Updated 6 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ☆18Jun 20, 2023Updated 2 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- 创建一个克隆隐藏的管理员账号/Create a Clone Hidden Administrator Account☆22Aug 28, 2019Updated 6 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Updated this week
- ☆15Dec 27, 2022Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆53Jun 28, 2025Updated 8 months ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated this week
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- ☆22Feb 25, 2026Updated 3 weeks ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Blog for x64dbg.☆13Jun 30, 2025Updated 8 months ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- ☆11Oct 13, 2019Updated 6 years ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago