gen0cide / laforge
Competition Infrastructure Management
☆86Updated 3 years ago
Alternatives and similar repositories for laforge:
Users that are interested in laforge are comparing it to the libraries listed below
- A repo full of example gscripts☆99Updated 5 years ago
- ☆53Updated 4 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆80Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 7 years ago
- ☆76Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆26Updated 5 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- ☆52Updated 6 years ago
- ☄️ go-out - A Golang egress buster.☆124Updated last year
- first commit☆20Updated last year
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- 504 VSAgent☆23Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Responsive Command and Control System☆102Updated 2 years ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆77Updated 6 years ago
- ☆28Updated 2 years ago