- Hampton Roads, Virginia
Stars
This repo holds all the plugins I made for Discord.
Repo for the Azure Master Class
Send phishing messages and attachments to Microsoft Teams users
This repo is for Microsoft Azure customers and Microsoft teams to collaborate in making custom policies.
A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon
Useful resources for SOC Analyst and SOC Analyst candidates.
A basic phishing kit scanner for dedicated and semi-dedicated hosting
A curated list of amazingly awesome puppet resources inspired by @bayandin's awesome-awesomeness.
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
Welcome to the Microsoft Defender for Cloud community repository
A curated list of Awesome Threat Intelligence resources
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
👤 Identity and Access Management knowledge for cloud platforms
This repo includes plenty of references for Azure learning, especially for the Azure certs and Azure architecture, and any other learning materials e.g. security and automation topics.
🛡️ Awesome Cloud Security Resources ⚔️
Repository for Azure Resource Policy built-in definitions and samples
The Azure Landing Zones (Enterprise-Scale) architecture provides prescriptive guidance coupled with Azure best practices, and it follows design principles across the critical design areas for organ…
Discover resources created in an AWS account.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
IAMFinder enumerates and finds users and IAM roles in a target AWS account.
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Standard and Advanced Demos for learn.cantrill.io courses
How to systematically secure anything: a repository about security engineering
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
📙 Amazon Web Services — a practical guide
Cloud Security Posture Management (CSPM)