flatironhealth / aws-remediation-frameworkView external linksLinks
☆20Jan 8, 2021Updated 5 years ago
Alternatives and similar repositories for aws-remediation-framework
Users that are interested in aws-remediation-framework are comparing it to the libraries listed below
Sorting:
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- ☆36Apr 29, 2025Updated 9 months ago
- ☆37Apr 30, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ☆12May 8, 2018Updated 7 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- An easy start with Intune☆11Aug 2, 2024Updated last year
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆15May 2, 2022Updated 3 years ago
- ☆13Oct 29, 2024Updated last year
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 3 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- Mobile application and IoT network analysis automation tool.☆11May 9, 2019Updated 6 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A Dark theme for VS Code☆13Apr 1, 2021Updated 4 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- ☆13Jan 5, 2026Updated last month
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- Microsoft Azure Exploitation Framework☆59Jun 30, 2021Updated 4 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- EsupNfcTagServer is the server part of the EsupNfcTag project☆15Jan 12, 2026Updated last month
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago