ericpskl / exportEC2VolumeImage
A Bash script which uses AWS CLI to create an image of an AWS EC2 volume
☆28Updated last year
Alternatives and similar repositories for exportEC2VolumeImage:
Users that are interested in exportEC2VolumeImage are comparing it to the libraries listed below
- Zone transfers for rwhois☆20Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- ☆25Updated 8 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- ☆16Updated 7 years ago
- Useful Powershell modules.☆11Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- ☆61Updated 7 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 3 years ago
- Automated Memory Forensic☆35Updated 6 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago