Lists (6)
Sort Name ascending (A-Z)
Stars
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
christophetd / my-arsenal-of-aws-security-tools
Forked from toniblyx/my-arsenal-of-aws-security-toolsList of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
âš¡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Resource types that can be publicly exposed on AWS
This repo has been replaced by https://www.cloudvulndb.org
Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
Indicators of Compromises (IOC) of our various investigations
clegirar / www.berty.tech
Forked from berty/www.berty.techOfficial website of Berty Technologies
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
cs231n assignments sovled by https://ghli.org
My corrections for the Standford class assingments CS231n - Convolutional Neural Networks for Visual Recognition
Public facing notes page
Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Open and extensible continuous delivery solution for Kubernetes. Powered by GitOps Toolkit.
The world’s fastest framework for building websites.
In-depth attack surface mapping and asset discovery