gen0cide / laforgeLinks
Competition Infrastructure Management
☆88Updated 4 years ago
Alternatives and similar repositories for laforge
Users that are interested in laforge are comparing it to the libraries listed below
Sorting:
- Provide a shell like interface by utilizing osquery's distributed API☆82Updated 5 years ago
- Git Web Hook Tunnel for C2☆28Updated 2 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Trivial unixey pentest utilities☆57Updated last year
- An extensible honeypot framework☆96Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- ☆53Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Updated 5 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 11 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- ☆61Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 4 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- ☆76Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 8 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 5 years ago
- OpenCV based IDN option generator PoC☆39Updated 9 years ago