gen0cide / laforgeLinks
Competition Infrastructure Management
☆88Updated 4 years ago
Alternatives and similar repositories for laforge
Users that are interested in laforge are comparing it to the libraries listed below
Sorting:
- An extensible honeypot framework☆95Updated 3 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆82Updated 5 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- ☆53Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- Git Web Hook Tunnel for C2☆28Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- ☆76Updated 7 years ago
- Trivial unixey pentest utilities☆57Updated last year
- first commit☆20Updated 4 months ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Updated 5 years ago
- ☆80Updated 6 years ago
- ☆61Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆129Updated 8 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- Drupal Honeypot☆58Updated 6 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 4 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Updated 6 years ago
- A repo full of example gscripts☆102Updated 6 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago