JDIS / Organisation
Dépôt relatif aux tâches organisationnelles et aux idées proposées pour JDIS
☆11Updated 3 years ago
Alternatives and similar repositories for Organisation:
Users that are interested in Organisation are comparing it to the libraries listed below
- Défis et solutions de l'éditions UnitedCTF-2019☆15Updated 5 years ago
- Exploits written by the Rhino Security Labs team☆1,070Updated 4 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆384Updated 4 years ago
- ☆10Updated 7 months ago
- Resource types that can be publicly exposed on AWS☆324Updated 3 years ago
- Forge your own CTF☆46Updated 3 years ago
- A honey token manager and alert system for AWS.☆319Updated 3 years ago
- A collection of AWS penetration testing junk☆1,190Updated last year
- Build jsii structs with ease.☆29Updated this week
- A mostly-serverless distributed hash cracking platform☆805Updated 11 months ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 6 years ago
- Minimal code to connect to a CEF debugger.☆204Updated 4 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆494Updated last year
- Dockerfile and Github action for publishing JSII packages☆18Updated 2 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- A crowdsourced AWS IAM permissions reference.☆91Updated last month
- Use AWS CDK constructs in CDKTF projects☆99Updated this week
- A CLI Tool to find resources in an AWS Account not actively managed by Cloudformation!☆11Updated 3 years ago
- 🧨 The DynamoDB Migrations Tool Command Line Interface (dynamit-cli)☆19Updated 2 years ago
- CloudQuery Provider SDK enables building providers to query any service or custom in-house solutions with SQL☆8Updated 2 years ago
- Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).☆264Updated 4 years ago
- CDK constructs for the fck-nat service☆73Updated this week
- Try to find the password of a file that was encrypted with the 'openssl' command.☆223Updated 11 months ago
- Monitors for CloudFormation stack drifts.☆51Updated this week
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆273Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- Challenges for Binary Exploitation Workshop☆605Updated 2 years ago
- CDK constructs for working with RDS☆16Updated last year
- CI/CD on AWS with feature-branch builds, developer-environment deployments, and build status notifications.☆28Updated last month