appsecco / breaking-and-pwning-apps-and-servers-aws-azure-trainingLinks
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
☆940Updated 2 years ago
Alternatives and similar repositories for breaking-and-pwning-apps-and-servers-aws-azure-training
Users that are interested in breaking-and-pwning-apps-and-servers-aws-azure-training are comparing it to the libraries listed below
Sorting:
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆674Updated 5 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆745Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,750Updated last year
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆916Updated 9 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆706Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆725Updated last year
- An archive of everything related to OSCP☆623Updated 5 years ago
- The Web Application Hacker's Handbook - Extra Content☆559Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆536Updated 2 years ago
- WeirdAAL (AWS Attack Library)☆821Updated 8 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Updated 5 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆922Updated 6 years ago
- a Damn Vulnerable Serverless Application☆543Updated 2 years ago
- An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.☆440Updated 3 years ago
- Exploits written by the Rhino Security Labs team☆1,086Updated 4 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆883Updated 6 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆642Updated 5 years ago
- Modified template for the OSCP Exam and Labs. Used during my passing attempt☆954Updated 4 years ago
- A list of the resources I use as I get ready for the exam☆503Updated 3 years ago
- ☆355Updated 4 years ago
- OSCP☆570Updated 3 years ago
- Awesome note-taking apps for hackers & pentesters !☆379Updated 4 years ago
- OSWE Preparation☆637Updated 3 years ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆556Updated 5 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,933Updated 2 months ago
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆813Updated 2 years ago
- wew oscp☆279Updated 3 years ago
- Collection of pentesting scripts☆440Updated 3 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated 11 months ago
- ☆1,396Updated 4 years ago