Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.
☆16Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for terraform-aws-ec2-instance-reverse-shell
Users that are interested in terraform-aws-ec2-instance-reverse-shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Offensive Terraform Website☆45Oct 8, 2020Updated 5 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- ☆14Feb 15, 2019Updated 7 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Simple utility for embedding files/resources inside golang binaries☆20Feb 20, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 8 months ago
- ☆20Feb 23, 2019Updated 7 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Jun 11, 2023Updated 2 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- ☆17Aug 16, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Nov 11, 2022Updated 3 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Updated this week
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- ☆16Aug 29, 2023Updated 2 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- Native Powers Talk demos☆17Jan 30, 2026Updated 2 months ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 months ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Implements a MVC-like platform in a WordPress site.☆11Oct 18, 2019Updated 6 years ago
- ☆19Oct 22, 2025Updated 5 months ago