threatexpress / threatbox
ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of scripts, lived as a rolling virtual machine, existed as code to build a Linux ISO, and has now been converted to a set of ansible playbooks. Why Ansible? Why not? This seemed a natural evolution.
☆72Updated this week
Related projects ⓘ
Alternatives and complementary repositories for threatbox
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆26Updated 3 weeks ago
- Custom pentesting tools☆24Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved …☆62Updated 3 years ago
- Noob Penetration tester☆10Updated 6 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Lightweight File Integrity Monitoring Tool☆32Updated 7 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆23Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆26Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆63Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Creates and sends fake meeting invite☆51Updated 3 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆42Updated last year
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆83Updated 5 months ago