cisagov / guacamole-packerLinks
Create machine images containing the Guacamole remote desktop gateway
☆11Updated last month
Alternatives and similar repositories for guacamole-packer
Users that are interested in guacamole-packer are comparing it to the libraries listed below
Sorting:
- Containerized pentesting tools☆45Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- ☆16Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Updated 8 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆24Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- all things awesome security☆14Updated 9 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- 🔵 ethereum grid trading bot☆35Updated last month
- Docker image for PowerShell remoting from Linux to Windows☆36Updated 6 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Updated 7 years ago
- Generate HTTPS reports based on scan data☆15Updated 2 weeks ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 12 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆31Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago