Holds the public Hacking the Cloud CTFs.
☆64Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for htc-ctfs
Users that are interested in htc-ctfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blogpost series showcasing interesting cloud - web app security bugs☆67May 15, 2026Updated last week
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 10 months ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 5 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆289Nov 27, 2025Updated 5 months ago
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆569Mar 12, 2026Updated 2 months ago
- Privateer is a plugin-based framework for security & compliance evaluations.☆21Updated this week
- Cross cloud workload identity research and workshops☆49Mar 5, 2026Updated 2 months ago
- Connect to Cisco AnyConnect VPN and open a Microsoft Remote Desktop (RDP) window☆12Apr 5, 2026Updated last month
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,657May 5, 2026Updated 2 weeks ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 4 years ago
- Jekyll Files for cloudsecwiki.com☆48Sep 16, 2021Updated 4 years ago
- AWS security training tasks for your first projects☆13Nov 4, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Proof of concept code for Datadog Security Labs referenced exploits.☆448May 8, 2026Updated 2 weeks ago
- List of known AWS accounts☆258Apr 2, 2026Updated last month
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated 2 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆46Jul 19, 2022Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.