Skip to content
View pr0b3r7's full-sized avatar

Highlights

  • Pro

Organizations

@humanaoffsec @HackerHermanos

Block or report pr0b3r7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

ATLAS Adversarial ML

AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac
28 repositories

TA0001 Initial Access

Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001
60 repositories

TA0002 Execution

Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002
319 repositories

TA0003 Persistence

Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003
34 repositories

TA0004 Privilege Escalation

Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004
92 repositories

TA0005 Defense Evasion

Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005
325 repositories

TA0006 Credential Access

Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006
135 repositories

TA0007 Discovery

Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007
151 repositories

TA0008 Lateral Movement

Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008
78 repositories

TA0009 Collection

Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009
21 repositories

TA0010 Exfiltration

Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010
10 repositories

TA0011 Command and Control (C2)

Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011
247 repositories

TA0040 Impact

Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040
6 repositories

TA0042 Resource Development

Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042
420 repositories

TA0043 Reconnaissance

Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043
168 repositories

Threat Hunting

Threat Hunting related repositories
123 repositories

Starred repositories

30 stars written in HCL
Clear filter

TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into product…

HCL 1,263 5,714 Updated Jul 13, 2025

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

HCL 921 263 Updated Apr 6, 2021

Cloudblock deploys secure ad-blocking and VPN for all devices. Text and video guides included! 6 supported cloud providers, plus Ubuntu and Raspberry Pi. Cloudblock deploys Wireguard VPN, Pi-Hole D…

HCL 861 85 Updated Jul 6, 2024

A place for the core work of the Modernisation Platform • This repository is defined and managed in Terraform

HCL 724 289 Updated Apr 14, 2026

🔧 Deploy customizable Active Directory labs in Azure - automatically.

HCL 427 87 Updated Dec 5, 2024

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams

HCL 385 77 Updated Mar 5, 2020

Disposable and resilient red team infrastructure with Terraform

HCL 277 88 Updated Feb 1, 2019

An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built for IaC stability, consistency, and speed.

HCL 206 55 Updated Nov 23, 2025

Slides and Codes used for the workshop Red Team Infrastructure Automation

HCL 194 39 Updated Apr 14, 2024

Bicep and Terraform code examples for policy-as-code workflows. Azure governance guardrails and automation - by @JesseLoudon

HCL 187 79 Updated Apr 20, 2024

A repo self-lead to give you an understanding on deploying Terraform on Azure

HCL 186 90 Updated Feb 5, 2026

WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.

HCL 151 16 Updated Jun 5, 2025

A Docker container for remote penetration testing.

HCL 139 28 Updated Mar 16, 2021

One proxy to rule them all

HCL 125 12 Updated Jul 28, 2024

Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.

HCL 92 12 Updated Nov 19, 2023

Companion code repository for learning to provision Terraform instances with Packer & cloud-init

HCL 85 106 Updated May 3, 2024

Solve IP Throttling with Rotating Proxies

HCL 81 9 Updated Apr 2, 2026

Various course materials, scripts, and configurations from my Offensive Security Engineering Course and Book "Red Team Engineering"

HCL 81 31 Updated Oct 20, 2025

DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)

HCL 64 26 Updated Jul 29, 2021
HCL 60 2 Updated May 25, 2023

Terraform script to deploy AD-based environment on Azure

HCL 41 11 Updated Apr 22, 2023
HCL 40 9 Updated May 21, 2022

A cloud automation system for Red Teams based on Terraform and Ansible

HCL 25 4 Updated Apr 21, 2021

Deployment code for ashirt-server

HCL 20 Updated Oct 15, 2025

This Terraform project creates a custom VPC with public and private subnets, an EC2 bastion host with a security group in the public subnet, an EKS cluster with a network interface in the public su…

HCL 13 19 Updated Mar 6, 2023

Follow Terraform Best Practice 🤖 ⚙️ 🔧

HCL 10 Updated Oct 23, 2022

An example of using terraform nested for loop to complement the TDS article

HCL 5 Updated Jul 2, 2022

A Terraform module for GitHub repositories in the Ministry of Justice • This repository is defined and managed in Terraform

HCL 5 Updated Nov 8, 2024

Template repository for creating Terraform modules for use with the Modernisation Platform • This repository is defined and managed in Terraform

HCL 2 5 Updated Apr 14, 2026