☆35Nov 14, 2024Updated last year
Alternatives and similar repositories for Cloud-Threat-Detection-Lab-AWS
Users that are interested in Cloud-Threat-Detection-Lab-AWS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 11 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated 3 weeks ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- ☆15Jan 27, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆616Updated this week
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 4 years ago
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆30Apr 12, 2026Updated 3 weeks ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 8 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆19Apr 28, 2025Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆20Jan 15, 2025Updated last year
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆101Oct 15, 2025Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆13May 9, 2022Updated 4 years ago
- ☆26May 29, 2025Updated 11 months ago
- Content Repo for Demystifying KQL Tutorial Series☆73Sep 1, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆38Jul 7, 2025Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Apr 27, 2024Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- ResearchDev - XDR & SIEM Detection☆67Apr 16, 2025Updated last year
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆134Apr 17, 2025Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆146May 24, 2022Updated 3 years ago
- ☆21Jul 16, 2025Updated 9 months ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year