sebrink / resources
Resources I've found helpful for learning computing security.
☆14Updated 5 years ago
Alternatives and similar repositories for resources:
Users that are interested in resources are comparing it to the libraries listed below
- Raw socket library/framework for red team events☆35Updated last year
- A collection of resources that I've used to learn things☆14Updated 3 years ago
- autopwn + deployment☆15Updated 2 years ago
- A security competition scoring system built on the Elastic stack.☆40Updated 11 months ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆22Updated 4 years ago
- ELK stack for red team logs☆12Updated 4 years ago
- RITSEC Weekly Labs☆11Updated 5 years ago
- Custom SOCKS proxy for redteam☆12Updated 2 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- NGINX module to allow for RCE through a specific header☆27Updated 2 years ago
- A C2 Bot using Raw Sockets on both Windows and Linux☆8Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- Deploy redteam infrastructure☆16Updated 3 years ago
- ☆102Updated 3 months ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 2 years ago
- ☆59Updated 6 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- C# User Simulation☆32Updated 2 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆70Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- ☆47Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Updated 3 years ago