☆25Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for AWSCloudSimulation
Users that are interested in AWSCloudSimulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆56Jul 8, 2022Updated 3 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Guard Duty Threat Feed: Automatically keeps FIRE_EYE feeds updated☆17Aug 17, 2018Updated 7 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- Tunnel SSH and other protocols over HTTP☆29Apr 22, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Slides and Workshop Instructions for a BPF Introduction @Sqreen☆12Sep 10, 2019Updated 6 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- A workshop about AWS WAF Classic and the WAF Security Automations Solution☆20Feb 19, 2021Updated 5 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- NIST based open source security automation delivered as AWS cloudformation☆19Jan 8, 2020Updated 6 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- A lightweight workshop build on the shoulders of giants.☆18Sep 13, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- ☆43Jun 2, 2021Updated 4 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- ☆27Feb 19, 2026Updated last month
- Custom Build and Test Components developed for AWS EC2 Image Builder (https://docs.aws.amazon.com/imagebuilder/latest/userguide/what-is-i…☆22May 1, 2023Updated 2 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- ☆51Apr 13, 2020Updated 5 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Aug 1, 2019Updated 6 years ago
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago