rapid7 / geppetto
Geppetto - Virtual machine and infrastructure orchestration
☆14Updated 6 months ago
Related projects: ⓘ
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 6 years ago
- Following repository contains source codes used in my two Books.☆10Updated 8 years ago
- DPE - Default Password Enumeration☆29Updated 11 years ago
- Open Standard Vulnerability & Compliance Scanner☆39Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- vyos based isolation of networks☆11Updated 3 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆19Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 9 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Mattermost - Shodan Slash command☆30Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆32Updated 5 years ago
- Public Github Pages for Cisco☆15Updated 5 years ago
- Scapy tools and scripts☆18Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 6 years ago
- ☆14Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- ☆15Updated 6 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆19Updated 4 months ago
- Fuzzer for finding Open Mail Relays☆14Updated 3 years ago