JOSHUAJEBARAJ / GCP-GOAT
GCP GOAT is the vulnerable application for learn the GCP Security
☆64Updated last year
Alternatives and similar repositories for GCP-GOAT:
Users that are interested in GCP-GOAT are comparing it to the libraries listed below
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- ☆35Updated 2 weeks ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆52Updated 3 years ago
- ☆134Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆165Updated 5 months ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- ☆110Updated last year
- GCP cloud security CTF☆44Updated last year
- Virtual Security Operations Center☆50Updated last year
- ☆55Updated last year
- Tools and blogs I use to perform GCP red teams☆110Updated 8 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 2 weeks ago
- Holds the public Hacking the Cloud CTFs.☆55Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 5 months ago
- ☆57Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- ☆45Updated 10 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆27Updated last month
- ☆172Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆113Updated last year
- Awesome list for cloud security related projects☆118Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆38Updated 3 months ago