tayontech / kali-soc-terraformView external linksLinks
This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an Infrastructure as Code (IaC) solution that allows users to easily replicate and manage a complete SOC environment using the Kali Purple suite.
☆117Nov 18, 2024Updated last year
Alternatives and similar repositories for kali-soc-terraform
Users that are interested in kali-soc-terraform are comparing it to the libraries listed below
Sorting:
- Cloudformation Template to Launch the SOC from Kali Purple☆53Dec 8, 2023Updated 2 years ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆37Nov 22, 2025Updated 2 months ago
- DigiNinja's bucket_finder utility☆17Aug 30, 2016Updated 9 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 10 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- Visual Studio Code extension for writing Terrascan Rego policies☆23Sep 7, 2024Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Dec 7, 2025Updated 2 months ago
- Bitor Scanning Software☆453Nov 7, 2025Updated 3 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Jan 28, 2025Updated last year
- ☆26Nov 8, 2024Updated last year
- ☆23Oct 9, 2024Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Dec 2, 2025Updated 2 months ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆27Oct 13, 2024Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated 2 weeks ago
- A real fake social engineering app☆130Jul 13, 2025Updated 7 months ago
- Setup script for a new Mac geared towards development and security things☆24Sep 12, 2025Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Jul 19, 2024Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Sep 8, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- These are my customization scripts written in ansible for every time I have to perform a Kali clean install.☆28Apr 26, 2025Updated 9 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated last year
- In depth guide for cybersecurity interviews☆148Jul 19, 2022Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 5 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated 11 months ago