M. Taufik Nelas's repositories
90DaysOfDevOps
This repository is my documenting repository for learning the world of DevOps. I started this journey on the 1st January 2022 and I plan to run to March 31st for a complete 90-day romp on spending an hour a day including weekends to get a foundational knowledge across a lot of different areas that make up DevOps.
awesome-cicd-security
:books: A curated list of awesome CI CD security resources
clickhouse-operator
Altinity Kubernetes Operator for ClickHouse creates, configures and manages ClickHouse clusters running on Kubernetes
digitalocean-kubernetes-challenge
Deploy a GitOps CI/CD implementation
docker-php-extension-installer
Easily install PHP extension in Docker containers
GFPGAN
GFPGAN aims at developing Practical Algorithms for Real-world Face Restoration.
gke-secret-manager
This repo contains example on how to consume secrets from Google Secret Manager from GKE
go-advice
List of advice and tricks for Go ʕ◔ϖ◔ʔ
How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.
kelasdevops
Kelas Devops
KLogger
Remote persistent 🔑Logger for Windows and Linux
pulumi-over-http-web
Example pulumi as a service that can be consumed via REST API
pygoat
intentionally vuln web Application Security in django
ransomware-simulator
Ransomware simulator written in Golang
security-labs-pocs
Proof of concept code for Datadog Security Labs referenced exploits.
SOC-OpenSource
This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC architecture.
Spark
Spark is a web-based, cross-platform and full-featured Remote Administration Tool that allows you control all your devices via browser anywhere. Spark是一个基于网页UI、跨平台以及多功能的远程控制和监控工具,可以通过浏览器,随时随地监控和控制你的所有设备。
ThePhish
ThePhish: an automated phishing email analysis tool
threat-matrix-cicd
Threat matrix for CI/CD Pipeline
VirusTotalC2
Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)