crahan / HolidayHackChallengeTemplateLinks
SANS Holiday Hack Challenge write-up template
☆16Updated last year
Alternatives and similar repositories for HolidayHackChallengeTemplate
Users that are interested in HolidayHackChallengeTemplate are comparing it to the libraries listed below
Sorting:
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 5 months ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆172Updated 10 months ago
- ☆175Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 4 years ago
- A repo to support the book☆108Updated 4 years ago
- Terraform project to build AWS instances for pivot practice☆11Updated 2 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Simple parser to get useful information from AWS S3 logs☆26Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- ☆47Updated 4 months ago
- ☆31Updated 3 years ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆116Updated 11 months ago
- Open Threat Hunting Framework☆118Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- ☆137Updated 2 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- Threat Simulation Indexes☆38Updated 4 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- ☆21Updated 2 years ago
- A list of RMMs designed to be used in automation to build alerts☆112Updated 4 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆136Updated 2 years ago
- ☆48Updated 8 months ago
- ☆26Updated 2 years ago
- DEFCON 31 slide deck and video link☆64Updated 2 months ago
- ☆36Updated last year
- Conference presentations☆47Updated last year
- ☆29Updated 4 years ago