DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆64Jul 29, 2021Updated 4 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Disposable and resilient red team infrastructure with Terraform☆278Feb 1, 2019Updated 7 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 4 months ago
- ☆11Jun 9, 2020Updated 5 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Receives Twitch EventSub Webhooks and Updates the Streams Online Status☆11Mar 2, 2026Updated 2 weeks ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 7 months ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆76Feb 7, 2021Updated 5 years ago
- ☆80Nov 21, 2019Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 11 months ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- Infrastructure Automation☆357Apr 12, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- ☆22Jan 2, 2026Updated 2 months ago
- List of HTB v4 APIs☆16Oct 19, 2024Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- ☆12Oct 15, 2024Updated last year
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Copy of Subtee's Repository That's Taken Down☆23Nov 2, 2017Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago