rapid7 / geppettoLinks
Geppetto - Virtual machine and infrastructure orchestration
☆13Updated 4 months ago
Alternatives and similar repositories for geppetto
Users that are interested in geppetto are comparing it to the libraries listed below
Sorting:
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Public Github Pages for Cisco☆14Updated 6 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 8 years ago
- Black-Box Penetration Testing and Vulnerability Management Platform, Bachelor's Thesis☆11Updated 8 years ago
- A firewall penetration testing tool suite.☆11Updated 8 years ago
- The official command line client for IPFinder☆11Updated 5 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A curated list of tools for incident response☆29Updated last year
- A lightweight authentication proxy for HTTP services☆17Updated last year
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- ☆26Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago