rapid7 / geppetto
Geppetto - Virtual machine and infrastructure orchestration
☆13Updated 3 months ago
Alternatives and similar repositories for geppetto
Users that are interested in geppetto are comparing it to the libraries listed below
Sorting:
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- A curated list of tools for incident response☆29Updated last year
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Build tools to generate vagrant images used by metasploit-framework CI☆13Updated 3 months ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Synack Red Team Firewall Script☆10Updated 10 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- module for certexfil☆15Updated 2 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆11Updated 8 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago