Simple demonstration on how to Lift & Shift OnPremise workload to AWS ๐
โ34Apr 7, 2021Updated 4 years ago
Alternatives and similar repositories for server-migration-onprem-to-aws
Users that are interested in server-migration-onprem-to-aws are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extra cmdlets to help with quering security related information from Azureโ14Sep 16, 2024Updated last year
- Purple Team Dropper generator using open source templates.โ17May 23, 2024Updated last year
- Fetching data from systemโ11Jun 18, 2017Updated 8 years ago
- Burp Suite Professional extension in Java for Tabnabbing attackโ13May 8, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.โ21Nov 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient โข AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Multipurpose tool, currently aimed for HackTheBox Battlegroundsโ20Nov 18, 2020Updated 5 years ago
- RuCTF 2022. Developed with โฅ by Hackerdom teamโ11May 22, 2022Updated 3 years ago
- โ18Dec 12, 2022Updated 3 years ago
- โ12May 8, 2018Updated 7 years ago
- โ13Jun 26, 2021Updated 4 years ago
- โ11Oct 19, 2018Updated 7 years ago
- โ13May 9, 2017Updated 8 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.โ22May 16, 2018Updated 7 years ago
- Read only mirror - No pull requestsโ20May 7, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI โข AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of Cobalt Strike aggressor scriptsโ17Jul 7, 2020Updated 5 years ago
- This is a CS project that will encrypt shell code from msfvenom using AESโ23Mar 24, 2022Updated 4 years ago
- terraform deployment for red teamโ26Dec 13, 2022Updated 3 years ago
- โ190Nov 21, 2024Updated last year
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by ofโฆโ26Mar 11, 2021Updated 5 years ago
- โ13Oct 15, 2018Updated 7 years ago
- Shellcode generation and encoding utilityโ24Jul 13, 2022Updated 3 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Freeโ16Jun 8, 2020Updated 5 years ago
- Our team's CTF writeupsโ11Jan 15, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient โข AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Burp Suite Extension for inserting a magic byte into responder's requestโ24Sep 22, 2023Updated 2 years ago
- Advanced Recon Toolโ26Aug 24, 2020Updated 5 years ago
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsecโ19Feb 2, 2026Updated last month
- Fitness-First Website Project During Covid19 Pandemicโ14Jan 17, 2025Updated last year
- Go bindings for LLama.cppโ14Apr 11, 2023Updated 2 years ago
- VW, Liblinear and StreamSVM compared on webspamโ14Oct 16, 2014Updated 11 years ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.โ31Jun 11, 2023Updated 2 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another processโ29Mar 24, 2022Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXEโ37Dec 2, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off โข AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Developed with โฅ by Hackerdom teamโ23Apr 26, 2023Updated 2 years ago
- K-means Algorithm in Rubyโ10Mar 14, 2015Updated 11 years ago
- Windows Persistence Toolkit in C#โ36Sep 23, 2022Updated 3 years ago
- Quantum-proof, 768-bit signatures for 1-bit messagesโ12Mar 11, 2020Updated 6 years ago
- โ39Sep 25, 2023Updated 2 years ago
- Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security researchโ82Mar 23, 2026Updated last week
- โ37Jun 27, 2020Updated 5 years ago