nicolasriverocorvalan / cloud-sniper
Virtual Security Operations Center
☆50Updated last year
Alternatives and similar repositories for cloud-sniper:
Users that are interested in cloud-sniper are comparing it to the libraries listed below
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Tool to automate corporate network segmentation test☆19Updated 4 years ago
- ☆19Updated 4 years ago
- Slides and materials for conference presentations☆11Updated last year
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- ☆18Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆41Updated last year
- AWS Security Checks☆37Updated 7 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- ☆12Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- ☆10Updated 4 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago