gen0cide / laforgeLinks
Competition Infrastructure Management
☆87Updated 3 years ago
Alternatives and similar repositories for laforge
Users that are interested in laforge are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- ☆53Updated 7 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Updated 7 years ago
- ☄️ go-out - A Golang egress buster.☆127Updated last year
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 11 months ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆61Updated 12 years ago
- A repo full of example gscripts☆100Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆53Updated 8 years ago
- ☆76Updated 6 years ago
- ☆53Updated 4 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- ☆8Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- first commit☆20Updated last year
- Security Onion Elastic Stack☆46Updated 4 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Honeybadger Red Edition☆13Updated 7 years ago
- ☆59Updated 6 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Ansible playbook to install cuckoo sandbox.☆11Updated 6 years ago