InsiderPhD / InfoSecCreatorsLinks
This is a RSS feed collection for all the InfoSec Content Creators
☆32Updated last year
Alternatives and similar repositories for InfoSecCreators
Users that are interested in InfoSecCreators are comparing it to the libraries listed below
Sorting:
- A collection of Turbo Intruder scripts.☆60Updated 4 months ago
- The Arcanum Prompt Injection Taxonomy☆94Updated 2 weeks ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 7 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆102Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated 5 months ago
- Dredging up secrets from the depths of the file system☆127Updated 6 months ago
- ☆182Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 6 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 6 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆92Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆36Updated last week
- Websec interview questions by tib3rius answered☆309Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last month
- Tools and blogs I use to perform GCP red teams☆115Updated 10 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆123Updated 2 years ago
- A research project to add some brrrrrr to Burp☆169Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆61Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆49Updated 3 months ago
- LLM Testing Findings Templates☆72Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 weeks ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆199Updated this week