gen0cide / laforge
Competition Infrastructure Management
☆86Updated 3 years ago
Alternatives and similar repositories for laforge:
Users that are interested in laforge are comparing it to the libraries listed below
- Testing/collecting some container breakouts☆93Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- first commit☆20Updated last year
- A collection of repositories used to make ISTS 16 possible.☆15Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- ☆52Updated 6 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- ☆53Updated 4 years ago
- ☆76Updated 6 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- A Django application to help red team operators manage a library of domain names☆162Updated last year
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- 504 VSAgent☆23Updated 7 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- ☆59Updated 5 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- newly registered domain name/brand infringement detector☆22Updated 3 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago