NicholasSpringer / thunder-ctf
GCP cloud security CTF
☆42Updated 10 months ago
Alternatives and similar repositories for thunder-ctf:
Users that are interested in thunder-ctf are comparing it to the libraries listed below
- ☆58Updated last year
- ☆32Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 4 months ago
- Enumerate AWS permissions and resources.☆66Updated 2 years ago
- Slides and materials for conference presentations☆11Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Posts about different topics☆36Updated 10 months ago
- Jenkins Security Research☆11Updated last month
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆29Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆133Updated last year
- Virtual Security Operations Center☆50Updated last year
- ☆68Updated last year
- A web security research tool for DOM testing☆17Updated this week
- ☆20Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- An Evil OIDC Server☆51Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 2 years ago
- ☆16Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated this week
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- ☆41Updated 9 months ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated this week