Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch every presentation!
☆85Jul 4, 2025Updated 9 months ago
Alternatives and similar repositories for fwdcloudsec-2025-summaries
Users that are interested in fwdcloudsec-2025-summaries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Certified Kubernetes Associate (CKA) exam notes☆12Mar 1, 2025Updated last year
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 9 months ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆18Dec 29, 2024Updated last year
- ☆13Feb 17, 2024Updated 2 years ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Jun 17, 2024Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆45Jan 29, 2019Updated 7 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆83Jan 6, 2026Updated 3 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Janus - Multi-tenant observability proxy for Prometheus, Loki, and Tempo with label-based access control and query enforcement☆39Mar 31, 2026Updated 2 weeks ago
- Postman collection and environment for Cisco Digital Network Architecture Controller (DNAC)☆19Jun 13, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆250Updated this week
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- ☆29Dec 26, 2025Updated 3 months ago
- ☆98Feb 19, 2024Updated 2 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Dec 20, 2018Updated 7 years ago
- ☆12Oct 25, 2023Updated 2 years ago
- An AWS IAM Privilege Escalation Path Library☆129Apr 2, 2026Updated 2 weeks ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 9 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- RabbitMQ monitoring module☆11Sep 29, 2015Updated 10 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆65Mar 30, 2026Updated 2 weeks ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆153Nov 15, 2023Updated 2 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆80Feb 25, 2025Updated last year
- Kubernetes Kubelet Image Credential Provider for Hashicorp Vault☆22Updated this week
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆42Jun 10, 2025Updated 10 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Apr 11, 2026Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Apr 7, 2026Updated last week
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 8 months ago