☆17Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for AWS-Cloud-Practicioner-Notes
Users that are interested in AWS-Cloud-Practicioner-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆20May 18, 2022Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆112May 30, 2021Updated 4 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Hackthebox, Vulnhub, TryHackMe and Real World PenTest☆126Sep 8, 2020Updated 5 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- ☆158Sep 20, 2021Updated 4 years ago
- ☆212Mar 4, 2022Updated 4 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago
- Notes I used when studying for the AWS Cloud Practioner certification. Hope it helps!☆20Sep 13, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 4 months ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Reports from various areas of information security☆272Apr 13, 2024Updated last year
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago