cno-io / bh_aws
Materials for AWS Training
☆15Updated 3 years ago
Alternatives and similar repositories for bh_aws:
Users that are interested in bh_aws are comparing it to the libraries listed below
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- ☆12Updated 4 months ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- ☆29Updated 6 years ago
- ☆41Updated 6 years ago
- ☆17Updated 7 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- Red Team Automation tool powered by go and terraform☆28Updated 3 years ago
- OSSEM Modular☆27Updated 4 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- ☆17Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Walking the PEB in VBA☆22Updated 4 years ago