☆39May 30, 2025Updated 11 months ago
Alternatives and similar repositories for Zero2Hero
Users that are interested in Zero2Hero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- A mirror image of my detection rules☆110Updated this week
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy☆23Nov 23, 2024Updated last year
- ☆16Jul 20, 2025Updated 9 months ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated last year
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Updated this week
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated last year
- ☆75Apr 24, 2026Updated last week
- Official urlscan.io and urlscan Pro CLI tool☆35Apr 1, 2026Updated last month
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆22Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An offensive toolkit for restless guests #DEFCON33☆59Aug 11, 2025Updated 8 months ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆46Dec 7, 2025Updated 4 months ago
- CloudFormation template for mining Ravencoin (RVN), Ergo (ERG), Kaspa (KAS), and Ethereum Classic (ETC) altcoins on AWS GPU-enabled EC2 i…☆24Oct 30, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Updated this week
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 6 months ago
- macOS Artifacts☆33Mar 2, 2025Updated last year
- FortiWeb CVE-2025-25257 exploit☆64Jul 11, 2025Updated 9 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect…☆82Feb 10, 2026Updated 2 months ago
- Penetration Testing Interview Questions☆55Apr 15, 2022Updated 4 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Apr 27, 2026Updated last week
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆132Apr 23, 2026Updated last week
- ☆54Aug 19, 2025Updated 8 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 10 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- ☆54Jan 19, 2026Updated 3 months ago
- Azure Service Subdomain Enumeration☆74Sep 2, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- a curated, categorised collection of useful projects☆131Apr 5, 2026Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 3 months ago
- ☆99Apr 3, 2026Updated last month
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆83Jan 6, 2026Updated 3 months ago
- A small collection of bookmarklets that are useful for OSINT, including ones for e-mail addresses, Facebook, extracting links and WhatsMy…☆124Apr 24, 2026Updated last week
- A powerful Python script that allows you to scrape messages and media from Telegram channels using the Telethon library. Features include…☆333Updated this week