☆23May 22, 2023Updated 2 years ago
Alternatives and similar repositories for cloud-security-bootcamp
Users that are interested in cloud-security-bootcamp are comparing it to the libraries listed below
Sorting:
- ☆10Jan 14, 2015Updated 11 years ago
- Manage GuardDuty At Enterprise Scale☆22Sep 17, 2020Updated 5 years ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆20Dec 15, 2021Updated 4 years ago
- ☆18Apr 21, 2020Updated 5 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆65Aug 6, 2024Updated last year
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- ☆17Updated this week
- ☆10Apr 11, 2020Updated 5 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- ☆11Oct 30, 2019Updated 6 years ago
- ☆12Feb 8, 2018Updated 8 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- token exchange as a service☆11Feb 23, 2026Updated last week
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ☆13Mar 27, 2021Updated 4 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- My *nix dotfiles☆12Jul 4, 2025Updated 7 months ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- Python for Penetration Testers, published by Packt☆14Jan 30, 2023Updated 3 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆49Mar 29, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- ☆14Jan 8, 2026Updated last month
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- X Developer Challenge☆11Apr 25, 2024Updated last year
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago