karimelmel / cloud-security-bootcampLinks
☆23Updated 2 years ago
Alternatives and similar repositories for cloud-security-bootcamp
Users that are interested in cloud-security-bootcamp are comparing it to the libraries listed below
Sorting:
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 4 years ago
- Supplemental templates for securing the cloud.☆37Updated 9 months ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Updated 4 years ago
- ☆139Updated 2 years ago
- ☆174Updated 2 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆184Updated 2 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Atomic Purple Team Framework and Lifecycle☆300Updated 4 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆172Updated 10 months ago
- The PoLRBear Project☆35Updated 4 years ago
- Find exposed data in Azure with this public blob scanner☆347Updated last year
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆238Updated 5 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆84Updated this week
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆267Updated last year
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- ☆65Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆144Updated 3 years ago
- Unlocking Serverless Computing to Assess Security Controls☆261Updated last year
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- ☆98Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- ☆150Updated 4 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆122Updated 5 months ago
- Security auditing tool for Azure environments☆583Updated 3 years ago
- ☆192Updated last week
- Active Directory Purple Team Playbook☆115Updated 2 years ago