gen0cide / laforgeLinks
Competition Infrastructure Management
☆87Updated 4 years ago
Alternatives and similar repositories for laforge
Users that are interested in laforge are comparing it to the libraries listed below
Sorting:
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- Testing/collecting some container breakouts☆94Updated 6 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Git Web Hook Tunnel for C2☆28Updated 2 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- Trivial unixey pentest utilities☆57Updated last year
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- ☆53Updated 7 years ago
- Drupal Honeypot☆58Updated 6 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Updated 6 years ago
- ☆54Updated 5 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- first commit☆20Updated 3 months ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 6 months ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 11 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- CCDC Red Team PWNboard☆77Updated 7 years ago