cisagov / kali-packer
This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.
☆21Updated 2 weeks ago
Alternatives and similar repositories for kali-packer:
Users that are interested in kali-packer are comparing it to the libraries listed below
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated 2 weeks ago
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated 3 months ago
- Kerberoast Detection Script☆30Updated 5 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A CALDERA plugin☆26Updated 8 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆69Updated 4 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆21Updated 3 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- US Government controls formatted for usability☆17Updated 3 years ago
- ☆11Updated 4 years ago
- ☆47Updated last week
- CSIRT Jump Bag☆26Updated last year
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year