Azure / CONVEXLinks
CONVEX is a group of CTFs that are independently deployable into participant Azure environments.
☆140Updated 3 years ago
Alternatives and similar repositories for CONVEX
Users that are interested in CONVEX are comparing it to the libraries listed below
Sorting:
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆236Updated 4 years ago
- ☆23Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- ☆150Updated 3 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- ☆169Updated 5 years ago
- ☆174Updated 2 years ago
- Microsoft Azure Exploitation Framework☆57Updated 3 years ago
- ☆137Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- Active Directory Purple Team Playbook☆108Updated 2 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 8 months ago
- Find exposed data in Azure with this public blob scanner☆336Updated 10 months ago
- Unlocking Serverless Computing to Assess Security Controls☆253Updated last year
- Atomic Purple Team Framework and Lifecycle☆294Updated 4 years ago
- Personal repo for messing with scripts☆26Updated 3 years ago
- Adam Raffe and Tom Wilde's Azure Security Lab☆64Updated 6 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- A repo to support the book☆108Updated 3 years ago
- Presentations☆17Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆91Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Notes on responding to security breaches relating to Azure AD☆111Updated 3 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- Security auditing tool for Azure environments☆580Updated 2 years ago