A Bash script which uses AWS CLI to create an image of an AWS EC2 volume
☆29Jan 1, 2024Updated 2 years ago
Alternatives and similar repositories for exportEC2VolumeImage
Users that are interested in exportEC2VolumeImage are comparing it to the libraries listed below
Sorting:
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- ☆61Mar 16, 2018Updated 8 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated 2 months ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- competition hackpack used by CU Cyber☆21Mar 9, 2022Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Challenges used in CUCTF 2019☆25Oct 13, 2019Updated 6 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- ☆15Aug 8, 2017Updated 8 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Mar 27, 2023Updated 2 years ago
- Let's brute force this hotel's tv.☆83Nov 21, 2019Updated 6 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- A command line interface for batch data insertion / retrieval from a Tenable Network Security Nessus SecurityCenter instance, with accomp…☆11May 16, 2018Updated 7 years ago
- ☆47May 18, 2020Updated 5 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- An API connector for the Office 365 Management API and the Elastic Stack☆20Aug 9, 2018Updated 7 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- Yet Another Zone Validation Script☆13Jan 17, 2025Updated last year
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- control de asistencia de una escuela☆11May 21, 2017Updated 8 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago