gen0cide / laforgeLinks
Competition Infrastructure Management
☆86Updated 3 years ago
Alternatives and similar repositories for laforge
Users that are interested in laforge are comparing it to the libraries listed below
Sorting:
- An extensible honeypot framework☆94Updated 3 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 3 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated 9 months ago
- ☆53Updated 7 years ago
- Trivial unixey pentest utilities☆57Updated last year
- ☆76Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Updated 8 years ago
- CCDC Red Team PWNboard☆77Updated 7 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Updated 5 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆63Updated 12 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago