Hands-On AWS Penetration Testing with Kali Linux published by Packt
☆137Jan 18, 2023Updated 3 years ago
Alternatives and similar repositories for Hands-On-AWS-Penetration-Testing-with-Kali-Linux
Users that are interested in Hands-On-AWS-Penetration-Testing-with-Kali-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Penetration Testing with Kali Linux - Third Edition, published by Packt☆31Jan 14, 2021Updated 5 years ago
- Mastering Kali Linux for Advanced Penetration Testing Third Edition, published by Packt☆74Jan 15, 2021Updated 5 years ago
- AWS Penetration Testing, published by Packt☆33Jan 18, 2023Updated 3 years ago
- Mastering Kali Linux for Advanced Penetration Testing - Second Edition, published by Packt☆63Jan 18, 2023Updated 3 years ago
- Kali Linux Network Scanning Cookbook Second Edition, published by Packt☆18Dec 15, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Kali Linux Web Penetration Testing Cookbook - Second Edition, published by Packt☆22Jan 15, 2021Updated 5 years ago
- Code repository for Hands-on PowerShell for Active Directory, Published By Packt☆14Jan 30, 2023Updated 3 years ago
- ☆13Jan 15, 2021Updated 5 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,110Updated this week
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Apr 16, 2021Updated 4 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Notes as I learn basic AWS penetration testing☆67May 28, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Mastering Windows PowerShell Scripting, Third Edition, published by Packt☆40Jan 30, 2023Updated 3 years ago
- Monitor an ECS Deployment☆16Feb 28, 2026Updated 3 weeks ago
- Python Remote Administration Tool With GUI☆18Jun 6, 2023Updated 2 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- ☆272Jul 26, 2022Updated 3 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- ☆263Jun 28, 2024Updated last year
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,416Oct 16, 2025Updated 5 months ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Best practices for hardening your AWS account, most of them are free☆35Nov 1, 2023Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15Mar 3, 2026Updated 3 weeks ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- A collection of AWS penetration testing junk☆1,221Aug 30, 2023Updated 2 years ago