InsiderPhD / InfoSecCreatorsLinks
This is a RSS feed collection for all the InfoSec Content Creators
☆32Updated last year
Alternatives and similar repositories for InfoSecCreators
Users that are interested in InfoSecCreators are comparing it to the libraries listed below
Sorting:
- ☆33Updated 7 months ago
- The Arcanum Prompt Injection Taxonomy☆103Updated last month
- Dredging up secrets from the depths of the file system☆127Updated 7 months ago
- A collection of Turbo Intruder scripts.☆60Updated 4 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆39Updated 3 weeks ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 7 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 7 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆93Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆246Updated 2 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆83Updated last month
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆67Updated 3 weeks ago
- Verizon Burp Extensions: AI Suite☆131Updated 2 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 11 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- ☆56Updated 2 weeks ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 10 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 4 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆67Updated this week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆103Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆119Updated 3 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆51Updated 4 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆279Updated last week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last week
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 7 months ago
- This is a companion to the Security Engineer Questions☆203Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 9 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆123Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month