gen0cide / laforge
Competition Infrastructure Management
☆86Updated 3 years ago
Alternatives and similar repositories for laforge:
Users that are interested in laforge are comparing it to the libraries listed below
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- ☆76Updated 6 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Updated 7 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆99Updated 2 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☄️ go-out - A Golang egress buster.☆124Updated last year
- Exfiltrate files via DNS☆96Updated 11 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Honeybadger Red Edition☆13Updated 7 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- first commit☆20Updated last year
- Scan for and exploit Consul agents☆40Updated 5 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 5 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- ☆53Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- ☆61Updated 6 years ago
- 504 VSAgent☆23Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici …☆82Updated 7 years ago