Dayspring Johnson's Projects
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
GCP Security Stuff
Enumerate AWS permissions and resources.
My Azure Cloud Security Meetup slides.
Azure Security Resources and Notes
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools.
An awesome README template to jumpstart your projects!
Standard and Advanced Demos for learn.cantrill.io courses
Azure AD cheatsheet for the CARTP course
Repo housing config, code and infra files for my chainguard demo.
Terraform + Ansible deployment scripts for an Active Directory lab environment in Azure.
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
Detection Engineering Maturity Matrix
Continuously monitor your AWS attack surface and evaluate services for configurations that can lead to degradation of confidentiality, integrity or availability. All results can be exported to Security Hub, JSON, CSV, Databases, and more for further aggregation and analysis.
Google Cloud Threat Detection: A Study in Google Cloud
My very first repository
How to systematically secure anything: a repository about security engineering
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
Learn the fundamentals of cloud computing
Exfiltrating Data from Linux Workloads: Uncovering theTechniques
Built-in Panther detection rules and policies
Simple portscanner