Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
☆93Nov 19, 2023Updated 2 years ago
Alternatives and similar repositories for OffensiveCloudDistribution
Users that are interested in OffensiveCloudDistribution are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Burp Suite extension to help make Graphql request more readable☆32Dec 7, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆534Mar 7, 2022Updated 4 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- A repo which contains lots of things which it shouldn't☆43Oct 23, 2019Updated 6 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆66Dec 12, 2018Updated 7 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Jul 12, 2023Updated 2 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- TotalRecon installs all the recon tools you need☆465Jul 3, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- ☆46May 12, 2025Updated 10 months ago
- Words list generator to crack security tokens☆110May 20, 2020Updated 5 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- ☆49Sep 20, 2019Updated 6 years ago
- generate reverse shell from CLI for linux and Windows.☆248Sep 17, 2020Updated 5 years ago