postmodern / phishing-training-sigs
A crowd sourced list of phishing training simulators and their signatures
☆18Updated 10 months ago
Alternatives and similar repositories for phishing-training-sigs:
Users that are interested in phishing-training-sigs are comparing it to the libraries listed below
- Audit log wall of shame.☆41Updated 5 months ago
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Updated 4 years ago
- Global Security Database Tools☆42Updated last year
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆42Updated last year
- Global Security Database Project☆28Updated 2 years ago
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- https://breaches.cloud☆38Updated 5 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 4 months ago
- ☆48Updated 5 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- ☆29Updated 5 months ago
- Scan publicly accessible assets on your AWS cloud environment☆139Updated 9 months ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- GCP CSPM using Google Sheets☆35Updated 9 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated last month
- App that simplifies building decision trees to model adverse scenarios☆205Updated 8 months ago
- Jupyter demo repository for PancakesCon2020☆16Updated 5 years ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Updated last year
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆71Updated this week
- Cross cloud workload identity research and workshops☆36Updated 2 weeks ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆122Updated 2 weeks ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated 10 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆32Updated 4 months ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year