rapid7 / geppetto
Geppetto - Virtual machine and infrastructure orchestration
☆13Updated last month
Alternatives and similar repositories for geppetto:
Users that are interested in geppetto are comparing it to the libraries listed below
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 8 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- Docker container for datasploit framework☆26Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated last year
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- CTF Writeups☆18Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Checklists☆16Updated 8 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- A curated list of tools for incident response☆29Updated last year
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago