al-ryan-breed's repositories
metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Ammyy-v3
Ammyy v3 Source Code leak , with ❤️ <3
ansible-cloudformation
Ansible role to render an arbitrary number of Jinja2 templates into cloudformation files and create any number of stacks.
cfn-flip-service
A serverless API that converts CloudFormation templates between JSON and YAML formats
daq
A git mirror of daq.
docker-tcpreplay
Docker container to send traffic for dev/troubleshooting to another container in docker using TCPREPLAY
language-log
Log file syntax highlighting in Atom
logstash-filter-base64
This filter helps you to base64 decode/encode your fields
metasploit-vulnerability-emulator
Created by Jin Qian via the GitHub Connector
msf-auxiliarys
My collection of metasploit auxiliary post-modules
pcre-parser
An ANTLR 4 grammar for PCRE
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
py-idstools
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
regex-filter-and-generator
This is Atom Package. Used as a regular expression filter and generator
resume
Working repository for resume and C.V. This is a superset of information that would actually be included in a resume submission, but is detailed here to supplement my own memory. This is also my playground for different flavors of markup and layout.
sls-lambdas
Repo for serverless lambdas
snort-rule
parses and generates Snort rules similar to PERL's Snort::Rule
Stitch
Python Remote Administration Tool (RAT)
sudo_sniff
Steal user's password when running sudo for post-exploitation purposes
TheFatRat
Thefatrat a massive exploiting tool revealed >> An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
unifiedbeat
Unifiedbeat reads records from Unified2 binary files generated by network intrusion detection software and indexes the records in Elasticsearch.