Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch every presentation!
☆85Jul 4, 2025Updated 10 months ago
Alternatives and similar repositories for fwdcloudsec-2025-summaries
Users that are interested in fwdcloudsec-2025-summaries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Certified Kubernetes Associate (CKA) exam notes☆12Mar 1, 2025Updated last year
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆104Jun 25, 2025Updated 10 months ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆18Dec 29, 2024Updated last year
- AWS Sentinel is a command-line security scanner for AWS resources. It helps identify common security issues in your AWS account. Now fea…☆31Jan 24, 2026Updated 3 months ago
- ☆13Feb 17, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆46Dec 7, 2025Updated 5 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Apr 30, 2026Updated last week
- ☆12Jun 17, 2024Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- OCSF Schema Validation☆12Updated this week
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆83Jan 6, 2026Updated 4 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Janus - Multi-tenant observability proxy for Prometheus, Loki, and Tempo with label-based access control and query enforcement☆39May 2, 2026Updated last week
- Postman collection and environment for Cisco Digital Network Architecture Controller (DNAC)☆19Jun 13, 2018Updated 7 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆254Apr 21, 2026Updated 2 weeks ago
- ☆29Dec 26, 2025Updated 4 months ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- ☆99Feb 19, 2024Updated 2 years ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆202Jan 6, 2026Updated 4 months ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Dec 20, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An AWS IAM Privilege Escalation Path Library☆129Apr 27, 2026Updated last week
- ☆12Oct 25, 2023Updated 2 years ago
- Google Maps for AWS IAM☆273Updated this week
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 7 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Did you contain the compromised identity? notyet☆40Updated this week
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆65Mar 30, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Nov 15, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆48Sep 18, 2025Updated 7 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated last year
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago