This repository is for the vagrant instances of VulnHub machines
☆46Sep 12, 2024Updated last year
Alternatives and similar repositories for VulnHub_Vagrant
Users that are interested in VulnHub_Vagrant are comparing it to the libraries listed below
Sorting:
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Jun 23, 2016Updated 9 years ago
- ☆16May 13, 2021Updated 4 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w …☆10Jul 25, 2023Updated 2 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- Data Brokers Information and Out-Out Links☆16Apr 12, 2024Updated last year
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Monitors the network for new connected MAC addresses☆17Dec 10, 2022Updated 3 years ago
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.☆15Aug 4, 2021Updated 4 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Supporting resources and documentation for FLARE @ Google Summer of Code 2023☆16Feb 7, 2023Updated 3 years ago
- Python library for the Gemini Exchange API☆17Oct 31, 2019Updated 6 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- This repository contains all the basic cheatsheets you need to get started to make notes in obsidian.☆18Oct 27, 2022Updated 3 years ago
- Jupyter demo repository for PancakesCon2020☆16Mar 23, 2020Updated 5 years ago
- ☆20Jan 5, 2024Updated 2 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Windows 10 (v1803+) ActivitiesCache.db parsers (SQLite, PowerShell, .EXE)☆196Feb 16, 2023Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago
- https://hackaday.io/project/26823-lameboy-another-esp12-handheld☆20Sep 8, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 8 months ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- A DFIR tool to collect artifacts on macOS☆56Mar 1, 2020Updated 6 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Aug 29, 2021Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated 2 weeks ago
- ☆57May 13, 2020Updated 5 years ago