☆35Nov 14, 2024Updated last year
Alternatives and similar repositories for Cloud-Threat-Detection-Lab-AWS
Users that are interested in Cloud-Threat-Detection-Lab-AWS are comparing it to the libraries listed below
Sorting:
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- Mapping of open-source detection rules and atomic tests.☆202Feb 16, 2026Updated 3 weeks ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- ☆21Jul 16, 2025Updated 7 months ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 3 months ago
- ☆15Jan 27, 2022Updated 4 years ago
- ASUS wifi router RCE vulnerability☆18Oct 13, 2025Updated 4 months ago
- Content Repo for Demystifying KQL Tutorial Series☆72Sep 1, 2024Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆98Oct 15, 2025Updated 4 months ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 2 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- ☆22Aug 29, 2024Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- A collection of bypasses and exploits for eBPF-based cloud security.☆26Jan 12, 2024Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- ☆58Dec 10, 2025Updated 2 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆79Feb 28, 2026Updated last week
- Resources for learning about application security☆56Jan 27, 2017Updated 9 years ago
- ResearchDev - XDR & SIEM Detection☆67Apr 16, 2025Updated 10 months ago
- ☆29Dec 12, 2024Updated last year
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- Security Content for the PEAK Threat Hunting Framework☆44Feb 15, 2024Updated 2 years ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources.☆137Updated this week
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 9 months ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆58Apr 4, 2024Updated last year
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Apr 15, 2025Updated 10 months ago
- Automated Active Directory lab running on Proxmox☆88Aug 8, 2025Updated 7 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆144May 24, 2022Updated 3 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- CCSP study resources, notes, exam material.☆46Jun 27, 2023Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Jan 10, 2025Updated last year