GCP cloud security CTF
☆47Jun 25, 2025Updated 8 months ago
Alternatives and similar repositories for thunder-ctf
Users that are interested in thunder-ctf are comparing it to the libraries listed below
Sorting:
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- ☆27Feb 19, 2026Updated last week
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- ☆13Mar 31, 2023Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- The alternative solution for AWS Organizations SCP feature which is not available in AWS China yet.☆14Oct 10, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Talk slides and material☆37Mar 24, 2024Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆71May 20, 2025Updated 9 months ago
- ☆39Aug 13, 2021Updated 4 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated last month
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- ☆141Updated this week
- AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID☆21Sep 7, 2021Updated 4 years ago
- Write ups to the CTF problems online.☆15Mar 17, 2022Updated 3 years ago
- ☆26Nov 25, 2025Updated 3 months ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆24Mar 20, 2023Updated 2 years ago
- ☆48Mar 19, 2020Updated 5 years ago
- ☆25Jun 27, 2024Updated last year
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆555May 26, 2023Updated 2 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- A safe place to hide all your precious data at.☆25Feb 27, 2025Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- ☆64Jan 17, 2026Updated last month
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year