☆38May 30, 2025Updated 9 months ago
Alternatives and similar repositories for Zero2Hero
Users that are interested in Zero2Hero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A mirror image of my detection rules☆47Updated this week
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆18Sep 4, 2023Updated 2 years ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy☆23Nov 23, 2024Updated last year
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆56Aug 25, 2019Updated 6 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated last month
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated last month
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated last year
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 10, 2026Updated 2 weeks ago
- Official urlscan.io and urlscan Pro CLI tool☆31Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 3 months ago
- ☆35Mar 5, 2026Updated 2 weeks ago
- ☆41May 17, 2025Updated 10 months ago
- CloudFormation template for mining Ravencoin (RVN), Ergo (ERG), Kaspa (KAS), and Ethereum Classic (ETC) altcoins on AWS GPU-enabled EC2 i…☆23Oct 30, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Updated this week
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 5 months ago
- macOS Artifacts☆33Mar 2, 2025Updated last year
- My playbook and Tools used for OSCP Exam☆40Oct 27, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect…☆81Feb 10, 2026Updated last month
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆123Mar 18, 2026Updated last week
- ☆53Aug 19, 2025Updated 7 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 8 months ago
- The MCP server that will help you trade smarter (or at least try)☆70Jul 30, 2025Updated 7 months ago
- Nethunter Kernel for Samsung Galaxy S20 FE 5G - r8q -G781X (Snapdragon) | Hardened_Kernel based on https://github.com/anthraxx/linux-har…☆57Mar 8, 2026Updated 2 weeks ago
- ☆55Jan 19, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure Service Subdomain Enumeration☆73Sep 2, 2024Updated last year
- GitHub - Stealerium/Stealerium: Stealer + Clipper + Keylogger☆82Aug 18, 2023Updated 2 years ago
- A native policy enforcement layer for AI coding agents. Built on OPA/Rego.☆228Mar 2, 2026Updated 3 weeks ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated last month
- A powerful Python script that allows you to scrape messages and media from Telegram channels using the Telethon library. Features include…☆254Mar 17, 2026Updated last week
- ☆100Oct 22, 2025Updated 5 months ago
- BloodHound PowerShell client☆79Dec 10, 2025Updated 3 months ago