Cloud security tutorials and best practices
☆38Mar 20, 2023Updated 3 years ago
Alternatives and similar repositories for tutorials
Users that are interested in tutorials are comparing it to the libraries listed below
Sorting:
- Command line tool for working with Panther rules and policies☆48Mar 13, 2026Updated last week
- Built-in Panther detection rules and policies☆441Mar 13, 2026Updated last week
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Cloud Security Automation☆13Dec 2, 2020Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- A carefully curated list of open source projects aimed at improving your AWS security posture!☆31Feb 22, 2022Updated 4 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- osquery input plugin☆10Oct 23, 2018Updated 7 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 28, 2026Updated 3 weeks ago
- Automate Sysmon Deployment and Configuration☆20Jul 26, 2024Updated last year
- InGraph is a declarative infrastructure graph DSL for AWS CloudFormation.☆48Feb 11, 2021Updated 5 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆32Aug 8, 2024Updated last year
- Creates secured box for accessing internal networks☆14Apr 5, 2019Updated 6 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Install and configure user mode auditd tools☆34Feb 17, 2026Updated last month
- Recon Hunt Queries☆79May 16, 2021Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- aws-vault like tool for Okta authentication☆17Aug 26, 2022Updated 3 years ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Aug 5, 2024Updated last year
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 4 years ago
- This repository contains examples of micro virtual machines (microVMs) that can be run using firecracker.☆23Jan 22, 2019Updated 7 years ago
- Scripts for interacting with MSRC portal data☆77Sep 12, 2018Updated 7 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Simple library to enable host based rollouts of changes☆67Dec 4, 2015Updated 10 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated last month
- A Python-native Detection as Code Framework☆19Jan 23, 2026Updated last month
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Python System Administration, Export list item, Sharepoint list, AD attributes, Active directory, sftp, sftp upload☆12Jul 26, 2023Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Cloud multi-account metadata management tool.☆91Oct 29, 2020Updated 5 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago