julianoborba / Ansible-CuckooLinks
This is a Ansible script for building a ready to go Cuckoo Sandbox server.
☆26Updated 7 years ago
Alternatives and similar repositories for Ansible-Cuckoo
Users that are interested in Ansible-Cuckoo are comparing it to the libraries listed below
Sorting:
- C# User Simulation☆33Updated 3 years ago
- ☆78Updated 8 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 7 years ago
- ☆26Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- ☆11Updated 6 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Exfiltration based on custom X509 certificates☆26Updated last year
- Presentation materials for talks I've given.☆20Updated 6 years ago
- SysCon14 release☆55Updated 8 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆23Updated 5 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- various slides and presentations I've worked on☆19Updated 8 months ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- ☆22Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago