Grzegorz Eliszewski's starred repositories
llm-course
Course to get into Large Language Models (LLMs) with roadmaps and Colab notebooks.
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
prowler
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
ScoutSuite
Multi-Cloud Security Auditing Tool
SecretScanner
:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:
bpf-developer-tutorial
eBPF Developer Tutorial: Learning eBPF Step by Step with Examples
review-checklists
This repo contains code and examples to operationalize Azure review checklists.
CEH-in-bullet-points
đź’» Certified ethical hacker summary in bullet points
C2IntelFeeds
Automatically created C2 Feeds
BobTheSmuggler
"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots).
stride-gpt
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
awesome-azure-security
A curated list of awesome Microsoft Azure Security tools, guides, blogs, and other resources.
OSTE-Meta-Scan
The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nuclei, SkipFish, and Wapiti.
EscalateGPT
An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.
cybersecurity-bug-bounty
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Bug Bounty in Cybersecurity.
awesome-vulnerable
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
VulnerableAzure
Terraform playbook of a vulnerable Azure deployment