nicolasriverocorvalan / cloud-sniperLinks
Virtual Security Operations Center
☆50Updated last year
Alternatives and similar repositories for cloud-sniper
Users that are interested in cloud-sniper are comparing it to the libraries listed below
Sorting:
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Tool to automate corporate network segmentation test☆19Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ☆32Updated 7 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆24Updated 6 years ago
- Slides and materials for conference presentations☆11Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Rest API Client to automate Nessus Scanning☆24Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆39Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- ☆19Updated 4 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago