Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.
☆16Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for terraform-aws-ec2-instance-reverse-shell
Users that are interested in terraform-aws-ec2-instance-reverse-shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆19Sep 27, 2020Updated 5 years ago
- Offensive Terraform Website☆45Oct 8, 2020Updated 5 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49May 15, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 9 months ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Simple utility for embedding files/resources inside golang binaries☆20Feb 20, 2021Updated 5 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 5 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Matt's DFIR blog☆14Jul 28, 2025Updated 9 months ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Jun 11, 2023Updated 2 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- ☆17Aug 16, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- ☆12May 6, 2021Updated 4 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Aug 29, 2023Updated 2 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 5 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 7 months ago
- ☆16Sep 9, 2021Updated 4 years ago
- For the code behind the eyes here https://www.youtube.com/watch?v=K9V43iSXRQA☆17Jul 31, 2025Updated 9 months ago
- ☆32Sep 10, 2025Updated 7 months ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- Detect and extract hidden files☆24Aug 29, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 months ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Implements a MVC-like platform in a WordPress site.☆11Oct 18, 2019Updated 6 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- Attributes sent to the server should be checked. This module allows you to cast data to its expected type before processing.☆13Jul 21, 2022Updated 3 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71May 9, 2023Updated 2 years ago