Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.
☆16Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for terraform-aws-ec2-instance-reverse-shell
Users that are interested in terraform-aws-ec2-instance-reverse-shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆19Sep 27, 2020Updated 5 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 8 months ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- ☆20Feb 23, 2019Updated 7 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Jun 11, 2023Updated 2 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- ☆17Aug 16, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆123Mar 18, 2026Updated last week
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- ☆16Aug 29, 2023Updated 2 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- For the code behind the eyes here https://www.youtube.com/watch?v=K9V43iSXRQA☆17Jul 31, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆32Sep 10, 2025Updated 6 months ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- ☆18Oct 22, 2025Updated 5 months ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago