☆40Nov 29, 2024Updated last year
Alternatives and similar repositories for gcp-ctf-workshop
Users that are interested in gcp-ctf-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jul 30, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- A tool that monitors a local Git repository, generates AI-powered summaries of recent commits (daily, weekly, or monthly), and sends them…☆13Apr 12, 2025Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆14Jan 8, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆24Jun 14, 2023Updated 2 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 11 months ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 31, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- ☆22Apr 17, 2023Updated 3 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- ☆72Oct 24, 2025Updated 6 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Apr 23, 2026Updated last week
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Search engine for CTF writeups with instant results.☆156Mar 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Files with examples that meet expectations☆10Jan 23, 2023Updated 3 years ago
- ☆26Apr 12, 2026Updated 3 weeks ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated 3 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆489Apr 20, 2026Updated 2 weeks ago
- ☆29Dec 26, 2025Updated 4 months ago
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- Slides from various conferences and talks I've given☆14Oct 12, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆17May 7, 2025Updated 11 months ago
- ☆25Jun 27, 2024Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year