Virtual machines that are set up with a variety of known vulnerabilities.
☆17Mar 1, 2022Updated 4 years ago
Alternatives and similar repositories for vulnerable-instances
Users that are interested in vulnerable-instances are comparing it to the libraries listed below
Sorting:
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆21Updated this week
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- CaptureIT can generate GIFs of both the actively selected window or your entire desktop☆32Aug 11, 2018Updated 7 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 27, 2026Updated last week
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- A Dockerized Ghidra Server☆15Jan 9, 2021Updated 5 years ago
- An automated Windows 11 Desktop Packer project that sets up SSH, WinRM, and virtualization additions☆26Mar 23, 2023Updated 2 years ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Sep 23, 2018Updated 7 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated 2 weeks ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 9 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- A list of user agents belonging to common web scanners.☆40Jun 27, 2022Updated 3 years ago
- Recipes for GCHQ's CyberChef Web App☆39Nov 15, 2018Updated 7 years ago
- Aqua Runtime Security POV Tool☆11Apr 18, 2025Updated 10 months ago
- A sort of a toolkit to decrypt Dropbox Windows DBX files☆32Apr 30, 2017Updated 8 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆30Jul 4, 2019Updated 6 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- agisoft photogrammetry processing scripts☆12Mar 18, 2016Updated 9 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- ☆48Feb 14, 2026Updated 3 weeks ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 8 months ago
- A Security Results Viewer for the web with storage, teams and history☆35Jan 19, 2023Updated 3 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated 2 months ago
- Minimal C port of UTF8-CPP☆12Jun 2, 2019Updated 6 years ago
- Module to support the import and export of Group Policy WMI filters.☆11Jun 23, 2023Updated 2 years ago
- Primarily aimed at replicating files that cannot be directly copied due to being in use.☆11Apr 22, 2024Updated last year