Hacking-the-Cloud / htc-ctfsView external linksLinks
Holds the public Hacking the Cloud CTFs.
☆63Feb 28, 2024Updated last year
Alternatives and similar repositories for htc-ctfs
Users that are interested in htc-ctfs are comparing it to the libraries listed below
Sorting:
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 6 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Jun 13, 2023Updated 2 years ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Jun 6, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆544Sep 11, 2025Updated 5 months ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,507Updated this week
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Jul 19, 2022Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆17Aug 18, 2020Updated 5 years ago
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated this week
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- Cross cloud workload identity research and workshops☆49Dec 19, 2025Updated last month
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆22Jun 9, 2019Updated 6 years ago
- ☆22Dec 21, 2021Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Online resources and study guide that will help preparing for Certified Kubernetes Security Specialist (CKS) exam. Please make pull reque…☆21Sep 25, 2020Updated 5 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 3 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆601Nov 24, 2025Updated 2 months ago
- ☆51Dec 13, 2025Updated 2 months ago
- Determine privileges from cloud credentials via brute-force testing.☆68Aug 22, 2024Updated last year
- ☆97Feb 19, 2024Updated last year
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- ☆43Aug 27, 2025Updated 5 months ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- A public repository with scripts and tools for mass / automated onboarding of cloud accounts (AWS,Azure,GCP)☆24Dec 17, 2020Updated 5 years ago
- I contain a plethora of random GitHub Actions demos☆15Apr 6, 2022Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆31Dec 31, 2021Updated 4 years ago