NicholasSpringer / thunder-ctf
GCP cloud security CTF
☆41Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for thunder-ctf
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- ☆31Updated 4 months ago
- ☆68Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- ☆133Updated last year
- ☆58Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆25Updated 3 months ago
- ☆68Updated 3 years ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- Collection of Slides From My Conference Talks☆20Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆45Updated last year
- ☆18Updated 2 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- This script is a multi-threaded Okta password sprayer.☆69Updated 10 months ago
- Kerberoast Detection Script☆30Updated last week
- Jenkins Security Research☆10Updated 3 months ago
- Virtual Security Operations Center☆49Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- An Evil OIDC Server☆51Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆65Updated 2 years ago
- ☆41Updated 7 months ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆74Updated 8 months ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- ☆36Updated 6 months ago
- ☆111Updated 3 years ago