Materials for AWS Training
☆15Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for bh_aws
Users that are interested in bh_aws are comparing it to the libraries listed below
Sorting:
- ☆12Oct 15, 2024Updated last year
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Automation framework for attack-defense CTFs.☆16Nov 22, 2019Updated 6 years ago
- ☆48Mar 19, 2020Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Talk slides and material☆37Mar 24, 2024Updated last year
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- ☆11May 8, 2022Updated 3 years ago
- 🥧 Generates classic British dishes☆13Dec 27, 2022Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- ☆11Mar 9, 2018Updated 7 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- ☆15Oct 29, 2024Updated last year
- ☆12Sep 18, 2015Updated 10 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- dcsync bof☆44Feb 13, 2026Updated 3 weeks ago
- Understanding AMM models in DeFI☆10Jul 28, 2021Updated 4 years ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- ☆10Jun 26, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year