Dayspring Johnson's repositories
Azure-Detection-Engineering
My Azure Cloud Security Meetup slides.
gcloud-threat-detection
Google Cloud Threat Detection: A Study in Google Cloud
portscanner
Simple portscanner
Azure-Red-Team-Stuff
Azure Security Resources and Notes
linux-data-exfil
Exfiltrating Data from Linux Workloads: Uncovering theTechniques
RedTeaming_CheatSheet
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
secure-gcp-reference
Best practice example for secure and compliant Google Cloud Platform infrastructure
simple-password-generator
A simple password generator script
awesome-aws-security
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
awesome-gcp-pentesting
GCP Security Stuff
awsenumeration
Enumerate AWS permissions and resources.
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Best-README-Template
An awesome README template to jumpstart your projects!
cantrill-labs
Standard and Advanced Demos for learn.cantrill.io courses
CARTP-cheatsheet
Azure AD cheatsheet for the CARTP course
CloudLabsAD
Terraform + Ansible deployment scripts for an Active Directory lab environment in Azure.
CRTP-cheatsheet
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
detection-engineering-maturity-matrix
Detection Engineering Maturity Matrix
ElectricEye
Continuously monitor your AWS attack surface and evaluate services for configurations that can lead to degradation of confidentiality, integrity or availability. All results can be exported to Security Hub, JSON, CSV, Databases, and more for further aggregation and analysis.
how-to-secure-anything
How to systematically secure anything: a repository about security engineering
kubernetes-the-hard-way
Bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
learn-to-cloud
Learn the fundamentals of cloud computing
panther-detections
Built-in Panther detection rules and policies
tcm-vuln-ad-terraform
Learning a little bit of DevOps and using Infrastructure-as-a-Code tools to automate the creation of the AD lab in TCM Security's course.