This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an Infrastructure as Code (IaC) solution that allows users to easily replicate and manage a complete SOC environment using the Kali Purple suite.
☆120Nov 18, 2024Updated last year
Alternatives and similar repositories for kali-soc-terraform
Users that are interested in kali-soc-terraform are comparing it to the libraries listed below
Sorting:
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- DigiNinja's bucket_finder utility☆17Aug 30, 2016Updated 9 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- Bitor Scanning Software☆455Nov 7, 2025Updated 4 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆132Jan 28, 2025Updated last year
- ☆26Nov 8, 2024Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆156Dec 2, 2025Updated 3 months ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Files with examples that meet expectations☆10Jan 23, 2023Updated 3 years ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- FINOS Common Cloud Controls☆78Mar 3, 2026Updated last week
- A Programmer☆14Dec 20, 2025Updated 2 months ago
- A real fake social engineering app☆131Jul 13, 2025Updated 7 months ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆14Aug 21, 2024Updated last year
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆134Jul 19, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- These are my customization scripts written in ansible for every time I have to perform a Kali clean install.☆28Apr 26, 2025Updated 10 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- In depth guide for cybersecurity interviews☆148Jul 19, 2022Updated 3 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆226Sep 4, 2024Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Crane POAM Automation Tool (C-PAT™)☆15Feb 28, 2026Updated last week