webpwnized / gcp-audit
GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks
☆21Updated 3 weeks ago
Alternatives and similar repositories for gcp-audit:
Users that are interested in gcp-audit are comparing it to the libraries listed below
- Virtual Security Operations Center☆50Updated last year
- ☆18Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A not-curated list of cloud hacking labs☆23Updated 11 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 8 months ago
- ☆17Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated this week
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆20Updated last year
- ☆15Updated 2 years ago
- ☆18Updated last year
- Continuous kerberoast monitor☆44Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆18Updated 4 years ago
- ☆16Updated 2 years ago
- ☆33Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆48Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- Validate proxies for specific domain☆35Updated 3 years ago