becomingahacker / cloud-cmlLinks
Run Cisco Modeling Labs on cloud infrastructure
☆11Updated 3 months ago
Alternatives and similar repositories for cloud-cml
Users that are interested in cloud-cml are comparing it to the libraries listed below
Sorting:
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆940Updated 2 years ago
- A list of shodan filters☆576Updated 6 years ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆556Updated 5 years ago
- TotalRecon installs all the recon tools you need☆463Updated 5 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,928Updated 2 months ago
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆751Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆536Updated 2 years ago
- Vulnerable API☆413Updated 2 years ago
- ☆114Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆705Updated last year
- Awesome note-taking apps for hackers & pentesters !☆379Updated 4 years ago
- A framework for layer 2 attacks☆799Updated 2 years ago
- Awesome cloud enumerator☆1,048Updated 6 months ago
- Collection of pentesting scripts☆440Updated 3 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆137Updated 2 years ago
- The Web Application Hacker's Handbook - Extra Content☆557Updated 2 years ago
- A curated constantly-growing library of infographics for network students☆99Updated 4 years ago
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆247Updated 3 months ago
- Learning Shodan through katas☆466Updated 5 years ago
- Awesome Writeups and POCs☆550Updated 7 months ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆459Updated 2 years ago
- OSCP☆570Updated 3 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆33Updated 5 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆745Updated 3 years ago
- Web recon script. No need to fear, sumrecon is here!☆388Updated 2 years ago
- ☆37Updated 5 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆319Updated last year
- Enumerate the permissions associated with AWS credential set☆1,188Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆652Updated this week