julianoborba / Ansible-CuckooLinks
This is a Ansible script for building a ready to go Cuckoo Sandbox server.
☆26Updated 7 years ago
Alternatives and similar repositories for Ansible-Cuckoo
Users that are interested in Ansible-Cuckoo are comparing it to the libraries listed below
Sorting:
- C# User Simulation☆33Updated 3 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- ☆78Updated 8 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- ☆11Updated 6 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- ☆26Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- various slides and presentations I've worked on☆19Updated 8 months ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- ☆23Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- ☆22Updated 4 years ago
- Methods of C2☆21Updated 10 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- ☆60Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Liberating dem proprietary APT implants☆20Updated 5 years ago