☆40Nov 29, 2024Updated last year
Alternatives and similar repositories for gcp-ctf-workshop
Users that are interested in gcp-ctf-workshop are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆25Jun 27, 2024Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated this week
- A tool that monitors a local Git repository, generates AI-powered summaries of recent commits (daily, weekly, or monthly), and sends them…☆13Apr 12, 2025Updated 10 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Collection of all previous 1337UP CTF challenges.☆78Jan 6, 2025Updated last year
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- ☆14Jul 9, 2024Updated last year
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 7 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- ☆72Oct 24, 2025Updated 4 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Search engine for CTF writeups with instant results.☆152Mar 6, 2025Updated 11 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- ☆65Aug 6, 2024Updated last year