Cumulus. Threat modeling the Clouds.
☆39Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for cumulus
Users that are interested in cumulus are comparing it to the libraries listed below
Sorting:
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆28Dec 5, 2025Updated 3 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- The Elevation of Privilege Threat Modeling Game☆343Jun 20, 2024Updated last year
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆14Jun 26, 2025Updated 8 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Convert Confluence MIME exports (.doc) to clean Markdown☆34Jan 13, 2026Updated last month
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆48May 1, 2023Updated 2 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Repo stojące za https://dev-radio.pl/☆11Dec 22, 2021Updated 4 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- Server component of my custom Toniebox reimplementation☆11Jul 30, 2017Updated 8 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆52Nov 24, 2025Updated 3 months ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- ☆41May 22, 2024Updated last year
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆13Sep 4, 2025Updated 6 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A dark retro theme for Zola☆35Dec 29, 2025Updated 2 months ago
- Automatically distribute GitHub Actions workflow across repositories.☆12Updated this week
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆11Mar 16, 2016Updated 9 years ago