Holds the public Hacking the Cloud CTFs.
☆63Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for htc-ctfs
Users that are interested in htc-ctfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blogpost series showcasing interesting cloud - web app security bugs☆49Jun 13, 2023Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 3 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 4 months ago
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆554Mar 12, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,602Updated this week
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 4 years ago
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Mar 9, 2026Updated 3 weeks ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- vulnerable windows binaries for exploitation practice☆47Jun 6, 2022Updated 3 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆13Apr 30, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆56Dec 13, 2025Updated 3 months ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Apr 9, 2021Updated 4 years ago
- ☆97Feb 19, 2024Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 5 months ago
- ☆22Dec 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 9 months ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Scan your account for the use of untrusted AMIs☆32Mar 22, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,524Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Mar 22, 2026Updated last week
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Mar 19, 2026Updated last week
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago
- OWASP Foundation Web Respository☆603Updated this week
- Open-source iOS app connecting Meta Ray-Ban smart glasses to AI assistants (OpenClaw + Gemini Live)☆35Feb 12, 2026Updated last month