-
SutroSec
- http://www.infointox.net
Stars
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
Stock options, RSUs, taxes — read the latest edition: www.holloway.com/ec
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
Automated network asset, email, and social media profile discovery and cataloguing.
An information security preparedness tool to do adversarial simulation.
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
Security Tool to Look For Interesting Files in S3 Buckets
Community guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto.
An evil RAT (Remote Administration Tool) for macOS / OS X.
AWS Least Privilege for Distributed, High-Velocity Deployment
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding
Pentest Lab on OpenStack with Heat, Chef provisioning and Docker
Impacket is a collection of Python classes for working with network protocols.
Daemon to ban hosts that cause multiple authentication errors
Collection of the most common vulnerabilities found in iOS applications
Mac Media Keys for the Masses
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available to test, platform, technology stack, versions, plugins, modu…
The easiest, and most secure way to access and protect all of your infrastructure.
A binary authorization and monitoring system for macOS
Security Guide for Developers
A Slack bot to add security info to messages containing URLs, hashes and IPs