cisagov / vulnerable-instancesView external linksLinks
Virtual machines that are set up with a variety of known vulnerabilities.
☆17Mar 1, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerable-instances
Users that are interested in vulnerable-instances are comparing it to the libraries listed below
Sorting:
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆20Feb 7, 2026Updated last week
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- CaptureIT can generate GIFs of both the actively selected window or your entire desktop☆32Aug 11, 2018Updated 7 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 8, 2026Updated last week
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- An automated Windows 11 Desktop Packer project that sets up SSH, WinRM, and virtualization additions☆26Mar 23, 2023Updated 2 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Sep 23, 2018Updated 7 years ago
- Automated pshtt, trustymail, and sslyze scanning☆28Updated this week
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆33Jun 4, 2025Updated 8 months ago
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- Aqua Runtime Security POV Tool☆11Apr 18, 2025Updated 9 months ago
- A list of user agents belonging to common web scanners.☆40Jun 27, 2022Updated 3 years ago
- A sort of a toolkit to decrypt Dropbox Windows DBX files☆31Apr 30, 2017Updated 8 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆30Jul 4, 2019Updated 6 years ago
- agisoft photogrammetry processing scripts☆12Mar 18, 2016Updated 9 years ago
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- ☆48Feb 1, 2026Updated 2 weeks ago
- A clone of FD (File & Directory tool) by T.Shirai☆16Jan 29, 2014Updated 12 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Updated this week
- A Security Results Viewer for the web with storage, teams and history☆35Jan 19, 2023Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆11Dec 14, 2016Updated 9 years ago
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 8 months ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated last month
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- APCMini streamdeck tool for OBS studio☆10Apr 28, 2022Updated 3 years ago
- Minimal C port of UTF8-CPP☆12Jun 2, 2019Updated 6 years ago