swimlane / elk-tls-dockerView external linksLinks
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆192Jun 6, 2024Updated last year
Alternatives and similar repositories for elk-tls-docker
Users that are interested in elk-tls-docker are comparing it to the libraries listed below
Sorting:
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Event Data Collector☆40Jan 12, 2026Updated last month
- ☆37Apr 30, 2020Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- RDP Checker☆65Feb 23, 2024Updated last year
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year
- extracts shellcode from a nasm compile macho binary☆16Jan 28, 2021Updated 5 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Dead simple C# project to take a screenshot.☆19Jan 14, 2019Updated 7 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆18Aug 24, 2015Updated 10 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆430Dec 5, 2024Updated last year
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Jan 24, 2026Updated 3 weeks ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Understand adversary tradecraft and improve detection strategies☆712Mar 9, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆238Jun 25, 2020Updated 5 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- ☆39May 21, 2022Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆175Mar 7, 2025Updated 11 months ago