karimelmel / cloud-security-bootcampLinks
☆23Updated 2 years ago
Alternatives and similar repositories for cloud-security-bootcamp
Users that are interested in cloud-security-bootcamp are comparing it to the libraries listed below
Sorting:
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- ☆140Updated 2 years ago
- ☆176Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆163Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Updated 4 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Updated 4 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆172Updated last year
- Supplemental templates for securing the cloud.☆37Updated 10 months ago
- Atomic Purple Team Framework and Lifecycle☆301Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆238Updated 5 years ago
- ☆65Updated last year
- Find exposed data in Azure with this public blob scanner☆349Updated last year
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Updated 3 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Updated 6 months ago
- The PoLRBear Project☆35Updated 4 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆84Updated 3 weeks ago
- Security auditing tool for Azure environments☆585Updated 3 years ago
- ☆150Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆45Updated 10 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- ☆33Updated 3 years ago
- ☆99Updated 3 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆268Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆74Updated 3 weeks ago