☆35Nov 14, 2024Updated last year
Alternatives and similar repositories for Cloud-Threat-Detection-Lab-AWS
Users that are interested in Cloud-Threat-Detection-Lab-AWS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Mar 28, 2022Updated 4 years ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- Mapping of open-source detection rules and atomic tests.☆206Feb 16, 2026Updated 2 months ago
- ☆15Jan 27, 2022Updated 4 years ago
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆29Apr 12, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Apr 11, 2026Updated last week
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 4 years ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- ☆22Aug 29, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆19Apr 28, 2025Updated 11 months ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆20Jan 15, 2025Updated last year
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆100Oct 15, 2025Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆14Jul 13, 2023Updated 2 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 6 months ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆35Jul 7, 2025Updated 9 months ago
- Content Repo for Demystifying KQL Tutorial Series☆73Sep 1, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- ResearchDev - XDR & SIEM Detection☆67Apr 16, 2025Updated last year
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆34Apr 14, 2025Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆146May 24, 2022Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Resources for learning about application security☆56Jan 27, 2017Updated 9 years ago
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- ☆20May 5, 2024Updated last year
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago