n0jam / gcp-ctf-workshop
☆32Updated last month
Alternatives and similar repositories for gcp-ctf-workshop:
Users that are interested in gcp-ctf-workshop are comparing it to the libraries listed below
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- ☆16Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 3 months ago
- Examine Chrome extensions for security issues☆70Updated this week
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 2 months ago
- Anvilogic Forge☆88Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆45Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 3 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆88Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆98Updated 3 months ago
- ☆39Updated this week
- Open Threat-Informed Detection Engineering☆28Updated last week
- Mapping of open-source detection rules and atomic tests.☆87Updated this week
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆47Updated 2 weeks ago
- ☆38Updated 8 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆21Updated this week
- ☆32Updated 3 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆29Updated 3 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆64Updated 8 months ago
- Rules shared by the community from 100 Days of YARA 2025☆23Updated last week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆19Updated this week
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 4 months ago
- ☆39Updated 7 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆94Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆45Updated 9 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆72Updated this week
- ☆32Updated 5 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆32Updated last month