GCP cloud security CTF
☆48Jun 25, 2025Updated 8 months ago
Alternatives and similar repositories for thunder-ctf
Users that are interested in thunder-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- ☆19Jul 9, 2022Updated 3 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- dcsync bof☆46Feb 13, 2026Updated last month
- ☆38Jun 9, 2021Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- ☆27Feb 19, 2026Updated last month
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆72May 20, 2025Updated 10 months ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- ☆13Mar 31, 2023Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Write ups to the CTF problems online.☆15Mar 17, 2022Updated 4 years ago
- ☆143Feb 26, 2026Updated 3 weeks ago
- Talk slides and material☆38Mar 24, 2024Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆558May 26, 2023Updated 2 years ago
- ☆22Aug 3, 2024Updated last year
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 9 months ago
- ☆11Jul 19, 2020Updated 5 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- ☆18Apr 20, 2022Updated 3 years ago
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- A safe place to hide all your precious data at.☆25Feb 27, 2025Updated last year
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 4 months ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago