marco-lancini / offensive-infrastructureView external linksLinks
Offensive Infrastructure with Modern Technologies
☆90Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for offensive-infrastructure
Users that are interested in offensive-infrastructure are comparing it to the libraries listed below
Sorting:
- Elasticsearch for Offensive Security☆139Aug 21, 2020Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 4 months ago
- Examples for Advanced Web Hacking Workshop☆34Dec 30, 2019Updated 6 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆10Jun 27, 2018Updated 7 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Dec 6, 2017Updated 8 years ago
- ☆13May 22, 2023Updated 2 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆64Oct 31, 2015Updated 10 years ago
- AWS Modernization DevSecOps Code Samples☆13Nov 30, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 6 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 7 years ago
- Declarative penetration testing orchestration framework☆295Dec 20, 2019Updated 6 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Linux setup tool for Kali Linux☆80Sep 6, 2018Updated 7 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- ☆18Sep 2, 2021Updated 4 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago