P3tra-WP / Jupyter-Threat
☆14Updated 2 years ago
Alternatives and similar repositories for Jupyter-Threat:
Users that are interested in Jupyter-Threat are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- Updated incident response generator for training classes☆43Updated 3 years ago
- ☆41Updated 3 weeks ago
- ☆35Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Systematic Universal Security Testing Orchestration☆37Updated 2 years ago
- ☆10Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- ☆14Updated last year
- AWS SSO serverless phishing API.☆31Updated 3 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- A zero-dependency tool for finding secrets in directories☆10Updated 4 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Threat Modeling Manifesto☆27Updated 8 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆15Updated 4 years ago
- ☆12Updated 3 years ago
- OWASP Foundation Web Respository☆29Updated 2 years ago