kernelsmith / env-customizationLinks
rc, vimrc, bashrc scripts, conf files, other customization
☆15Updated 6 months ago
Alternatives and similar repositories for env-customization
Users that are interested in env-customization are comparing it to the libraries listed below
Sorting:
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Bash-completion script for Nmap☆72Updated 8 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Updated 10 years ago
- Collection of binaries and scripts found across the net☆20Updated 12 years ago
- Collection of Auditd Examples and Presentations☆88Updated 5 years ago
- Exploit Dev Wiki☆13Updated 12 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- cuckoo sandbox patches and scripts☆15Updated 12 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Detect malicious domain, Blablablablabla☆27Updated 9 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Updated 8 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 10 years ago
- A simple command-line script to interact with the virustotal-api☆62Updated 7 years ago
- Check UNIX/Linux systems for privilege escalation☆126Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Incident Response Scripts☆30Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆66Updated 10 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Updated 10 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Updated 11 years ago