Pinned Repositories
breaking-and-pwning-apps-and-servers-aws-azure-training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
endgame
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
gchib297.github.io
Personal portfolio
GTUPYCAMP
GTUpython
HashPy
A simple script created at GTUPyCamp Arpil, 2015
heralding
Credentials catching honeypot
lol
my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
gchib297's Repositories
gchib297/breaking-and-pwning-apps-and-servers-aws-azure-training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
gchib297/cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
gchib297/endgame
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
gchib297/gchib297.github.io
Personal portfolio
gchib297/GTUPYCAMP
gchib297/GTUpython
gchib297/HashPy
A simple script created at GTUPyCamp Arpil, 2015
gchib297/heralding
Credentials catching honeypot
gchib297/lol
gchib297/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
gchib297/OSINT-Framework
OSINT Framework
gchib297/prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.
gchib297/random
gchib297/randorisec-talks
Security conferences talks
gchib297/randorisec-workshops