Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch every presentation!
☆85Jul 4, 2025Updated 8 months ago
Alternatives and similar repositories for fwdcloudsec-2025-summaries
Users that are interested in fwdcloudsec-2025-summaries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Certified Kubernetes Associate (CKA) exam notes☆12Mar 1, 2025Updated last year
- ☆13Feb 17, 2024Updated 2 years ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 3 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Updated this week
- ☆12Jun 17, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆81Jan 6, 2026Updated 2 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆245Updated this week
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Janus - Multi-tenant observability proxy for Prometheus, Loki, and Tempo with label-based access control and query enforcement☆37Mar 14, 2026Updated 2 weeks ago
- Postman collection and environment for Cisco Digital Network Architecture Controller (DNAC)☆19Jun 13, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Repository with supporting materials for Invictus Academy/Training☆43Jan 3, 2025Updated last year
- ☆97Feb 19, 2024Updated 2 years ago
- An AWS IAM Privilege Escalation Path Library☆124Mar 16, 2026Updated 2 weeks ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Google Maps for AWS IAM☆271Updated this week
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- ☆12Oct 25, 2023Updated 2 years ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 9 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- An industrial strength, best practice reference architecture showing how to prevent credential sprawl with Vault on AWS☆18Jun 18, 2017Updated 8 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆64Jul 27, 2025Updated 8 months ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- ☆15May 28, 2022Updated 3 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆153Nov 15, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Use Amazon Comprehend Medical to extract medical insight from notes inside the OMOP Common Data Model☆14Feb 28, 2019Updated 7 years ago
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆41Jun 10, 2025Updated 9 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Mar 19, 2026Updated last week
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago