A Bash script which uses AWS CLI to create an image of an AWS EC2 volume
☆29Jan 1, 2024Updated 2 years ago
Alternatives and similar repositories for exportEC2VolumeImage
Users that are interested in exportEC2VolumeImage are comparing it to the libraries listed below
Sorting:
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- ☆61Mar 16, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated last month
- ☆17Oct 26, 2018Updated 7 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 5 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- ☆19Dec 5, 2024Updated last year
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- ☆19Jul 9, 2019Updated 6 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Aug 9, 2018Updated 7 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Apr 10, 2024Updated last year
- ☆16Mar 4, 2019Updated 6 years ago
- Let's brute force this hotel's tv.☆83Nov 21, 2019Updated 6 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year