Holds the public Hacking the Cloud CTFs.
☆63Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for htc-ctfs
Users that are interested in htc-ctfs are comparing it to the libraries listed below
Sorting:
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆48Jun 13, 2023Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Privateer is a plugin-based framework for security & compliance evaluations.☆18Mar 2, 2026Updated last week
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,546Feb 10, 2026Updated 3 weeks ago
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Mar 1, 2026Updated last week
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- Cross cloud workload identity research and workshops☆49Updated this week
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Sep 29, 2023Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- vulnerable windows binaries for exploitation practice☆48Jun 6, 2022Updated 3 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 3 years ago
- ☆10Aug 12, 2022Updated 3 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Online resources and study guide that will help preparing for Certified Kubernetes Security Specialist (CKS) exam. Please make pull reque…☆21Sep 25, 2020Updated 5 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Aug 22, 2024Updated last year
- ☆52Dec 13, 2025Updated 2 months ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 3 weeks ago