n0jam / gcp-ctf-workshop
☆35Updated 4 months ago
Alternatives and similar repositories for gcp-ctf-workshop:
Users that are interested in gcp-ctf-workshop are comparing it to the libraries listed below
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Anvilogic Forge☆103Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆44Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆92Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2025☆32Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Examine Chrome extensions for security issues☆81Updated last month
- ☆40Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 5 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 7 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 5 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 2 weeks ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆72Updated 11 months ago
- ☆41Updated last month
- NOVA: The Prompt Pattern Matching☆57Updated last week
- ☆32Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.☆163Updated 3 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆27Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆107Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- ☆16Updated 5 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆43Updated this week
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated last week
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 5 months ago