Cloud security tutorials and best practices
☆38Mar 20, 2023Updated 2 years ago
Alternatives and similar repositories for tutorials
Users that are interested in tutorials are comparing it to the libraries listed below
Sorting:
- Command line tool for working with Panther rules and policies☆48Updated this week
- Built-in Panther detection rules and policies☆439Updated this week
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Automate Sysmon Deployment and Configuration☆20Jul 26, 2024Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆20Jul 21, 2025Updated 7 months ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆25Dec 8, 2021Updated 4 years ago
- ☆25Dec 10, 2018Updated 7 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Jun 25, 2025Updated 8 months ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 4 years ago
- Install and configure user mode auditd tools☆34Feb 17, 2026Updated last week
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Learn from Casey Smith@subTee☆29Apr 17, 2021Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- Technical Tabletop Exercises Simulation Framework☆48Oct 30, 2023Updated 2 years ago
- Pure-Python library for computing fuzzy hashes (ssdeep)☆48Feb 21, 2026Updated last week
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Updated this week
- ☆42Jul 23, 2025Updated 7 months ago
- ☆34Apr 29, 2021Updated 4 years ago
- ☆40Nov 29, 2024Updated last year
- ☆37Jun 27, 2020Updated 5 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆40Sep 2, 2025Updated 5 months ago
- A simple CLI utility that makes it easier to switch between different AWS roles☆44Apr 2, 2020Updated 5 years ago
- Module to support the import and export of Group Policy WMI filters.☆11Jun 23, 2023Updated 2 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago