Learning Activities for the AWS Security Specialty Course
☆83Apr 11, 2019Updated 6 years ago
Alternatives and similar repositories for la-aws-security_specialty
Users that are interested in la-aws-security_specialty are comparing it to the libraries listed below
Sorting:
- Automating AWS with Lambda, Python, and Boto3☆209Jul 25, 2023Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- ☆30Jul 12, 2023Updated 2 years ago
- ℹ️ Terraform module blueprint.☆11Jun 11, 2025Updated 8 months ago
- Demonstrates sending AWS SecurityHub findings to your email☆14Dec 14, 2018Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- ☆14Oct 3, 2018Updated 7 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆60Jan 14, 2026Updated last month
- Dockercon 2016 Security Workshop☆35Aug 30, 2016Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated 10 months ago
- GDB cheatsheet for reversing binaries☆21Jan 25, 2019Updated 7 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- ☆20Aug 14, 2022Updated 3 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- [Node, Python, Java] Repository of sample Custom Rules for AWS Config.☆1,727Jan 16, 2026Updated last month
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- ☆24Oct 7, 2020Updated 5 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- OWASP Application Security Verification Standard 4.0 Checklist☆33Apr 15, 2019Updated 6 years ago
- A tool for securing communications between a client and a DNS resolver☆31Jan 22, 2013Updated 13 years ago
- Demo code for the Timely Security Analytics and Analysis 2015 Re:Invent presentation.☆29Jan 30, 2020Updated 6 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Dusseldorf is an out-of-band security tool to help in security research.☆50Updated this week
- ☆29Jul 25, 2023Updated 2 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- Derek's Terraform Course☆73Apr 26, 2019Updated 6 years ago