cisagov / cool-assessment-terraform
Terraform to deploy an assessment environment to the COOL
☆14Updated 3 months ago
Alternatives and similar repositories for cool-assessment-terraform:
Users that are interested in cool-assessment-terraform are comparing it to the libraries listed below
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆13Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 3 years ago
- ☆58Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- ☆77Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆42Updated last week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆17Updated 5 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- ☆23Updated 2 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- ☆21Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆58Updated 3 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆30Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 8 months ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆15Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆67Updated 8 months ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated last year