julianoborba / Ansible-CuckooLinks
This is a Ansible script for building a ready to go Cuckoo Sandbox server.
☆25Updated 7 years ago
Alternatives and similar repositories for Ansible-Cuckoo
Users that are interested in Ansible-Cuckoo are comparing it to the libraries listed below
Sorting:
- Exfiltration based on custom X509 certificates☆26Updated last year
- Presentation materials for talks I've given.☆20Updated 5 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- ☆22Updated 4 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 6 years ago
- ☆11Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- ☆23Updated 4 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 7 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- SysCon14 release☆53Updated 8 years ago
- ProcDot Malware Sandbox☆24Updated 7 months ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Methods of C2☆21Updated 9 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago