A collection of automated tools for different cloud infrastructures - Azure & AWS & Google Cloud
☆18Dec 26, 2024Updated last year
Alternatives and similar repositories for Offensive-Cloud-Tools
Users that are interested in Offensive-Cloud-Tools are comparing it to the libraries listed below
Sorting:
- ☆10Feb 12, 2026Updated 2 weeks ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- ☆12Apr 17, 2022Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Set up and manage Exchange Online for a small (fictitious) start-up company.☆14Nov 19, 2024Updated last year
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Azure - IaaS Storage Monitoring☆11Feb 21, 2023Updated 3 years ago
- Synthesising graphs and simulating things☆10Oct 25, 2022Updated 3 years ago
- Analysis of the major exploits that took place on the Ethereum blockchain☆17Oct 31, 2022Updated 3 years ago
- SAP security maturity model☆14Mar 6, 2024Updated last year
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 6 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Nov 8, 2022Updated 3 years ago
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆18Mar 29, 2025Updated 11 months ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- ☆12Jan 6, 2022Updated 4 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- ☆18Jan 9, 2025Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- USN Journal full path builder☆65Sep 16, 2024Updated last year
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Wassist allows you to contact GPT3 directly from WhatsApp and not only that. Wassist also allows you to save your own personal data and l…☆16Feb 9, 2026Updated 3 weeks ago
- Entra ID (Azure AD) error codes as JSON☆16Oct 30, 2025Updated 4 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- ☆15Mar 26, 2022Updated 3 years ago
- ☆17Jul 20, 2024Updated last year
- Advanced Interactive Security Workshop☆20Dec 28, 2020Updated 5 years ago
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- Azure AD Security controls check.☆16Feb 25, 2023Updated 3 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago