jassics / CybercloudLearning
Repo for Cybercloud Tutorials hosted at cybercloud.guru
☆2Updated 5 months ago
Alternatives and similar repositories for CybercloudLearning:
Users that are interested in CybercloudLearning are comparing it to the libraries listed below
- ☆34Updated last year
- ☆15Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- ☆29Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- ☆15Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- ☆12Updated 3 years ago
- ☆18Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆51Updated 2 years ago
- Python for Defenders Course Resources☆16Updated 11 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆24Updated 5 years ago
- ☆11Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆29Updated 3 years ago
- ☆24Updated 3 years ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- ☆43Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆35Updated last month
- Script to manage and create local pentesting training virtual lab☆48Updated 4 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 8 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- ☆22Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago