vengatesh-nagarajan / Cloud-pentest
Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud
☆50Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cloud-pentest
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆96Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆18Updated 2 years ago
- ☆63Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆42Updated last year
- ☆31Updated last week
- ☆36Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- ☆16Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- ☆12Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆89Updated 8 months ago
- Offensive Security Web Assessor Resources Repo☆21Updated last year
- ☆72Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆88Updated last year
- Damn Vulnerable Rails app☆11Updated 12 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆22Updated 3 years ago
- Awesome list for cloud security related projects☆77Updated 2 years ago
- ☆17Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated last year
- ☆31Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆48Updated last year
- Find the remote website version based on a git repository☆124Updated 3 years ago
- Notes for CRTP☆39Updated 3 years ago
- MayorSec DNS Enumeration Tool☆76Updated last year
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆11Updated 5 years ago