Divio publishes a great list of podcasts will links and descriptions here.
Now owned by Pluralsight, A Cloud Guru is still an amazing resource for all kinds of cloud skills and certification training.
AI-Goat is a deliberately vulnerable AI infrastructure hosted on AWS, designed to simulate the OWASP Machine Learning Security Top 10 risks
Practical exercises to learn about Amazon Elastic Kubernetes Service
This cheat sheet outlines tips and tools for analyzing malicious documents, such as Microsoft Office, RTF, and PDF files.
Attacking and Defending Serverless Applications
A curated list of awesome malware analysis tools and resources.
A curated list of Docker resources and projects
This is a good starting point on the AWS Certification journey for individuals with no prior IT or cloud experience switching to a cloud career or for line-of-business employees looking for foundational cloud literacy.
AWS Certified Solutions Architect - Associate showcases knowledge and skills in AWS technology, across a wide range of AWS services.
AWS Certified Solutions Architect - Professional is intended for individuals with two or more years of hands-on experience designing and deploying cloud architecture on AWS.
Exam guide for the AWS Certified Solutions Architect - Professional (SAP-C02)
Learn, measure, and build using architectural best practices according the the AWS Well Architected Framework
BadZure was initialy written to host the Azure AD Battle School: Hands-on Attack and Defense workshop at X33fcon 2023.
Binary Edge scans the entire public internet, create real-time threat intelligence streams, and reports that show the exposure of what is connected to the Internet.
This course provides comprehensive insights into cloud-based attack surfaces, a step-by-step methodology for compromising cloud environments, and practical guidance on leveraging open-source tools for effective cloud assessments.
This app will test your hacking skills in the Azure cloud space.
An easy-to-follow guide to get your first cluster and application up and running
Bust-A-Kube is an intentionally-vulnerable Kubernetes cluster, intended to help people self-train on attacking and defending Kubernetes clusters.
Expert IT training — when and where you need it.
Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS.
This is an AWS/GitLab CI/CD themed CTF that you can run in your own AWS account.
Cloud Katana is a cloud native tool developed from the need to automate the execution of simulation steps in multi-cloud and hybrid cloud environments.
One cloudsec lab. 15-30 minutes. Every week.
A Gamified Cloud Hacking Sandbox
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool. It allows you to hone your cloud cybersecurity skills by creating and completing several "capture-the-flag" style scenarios.
CloudSec Tidbits is a blogpost series showcasing interesting bugs found by Doyensec during cloud security testing activities.
An open project to list all known cloud vulnerabilities and CSP security issues
CNAPPgoat is a multi-cloud, vulnerable-by-design environment deployment tool – specifically engineered to facilitate practice arenas for defenders and pentesters.
Code Formatter, JSON Beautifier, XML Viewer, Hex Converters and more...
A curated directory of cybersecurity tools and resources for infosec professionals.
17 best cybersecurity-related podcasts, according to SANS
Leaked Credentials
direnv is an extension for your shell. It augments existing shells with a new feature that can load and unload environment variables depending on the current directory.
Dive Into Ansible course by James Spurin
DNS recon & research, find & lookup DNS records
Google dorks are special search terms that are used to access specific sets of information that are not available with normal queries.
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable.
eksctl is a simple CLI tool for creating and managing clusters on EKS - Amazon's managed Kubernetes service for EC2.
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
Through a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS).
Similar to the original flAWS.cloud this game/tutorial teaches you AWS (Amazon Web Services) security concepts.
A better way to run & fine-tune open-source models on your data. Your data, your models, your AI.
GCP-Goat is intentionally vulnerable GCP environment to learn and practice GCP Security
Deploy a demonstration microservices app on GCP.
GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
Upskill yourself or your team with Google Cloud Skills Boost. From beginners to experts, find the credentials and trainings you need to achieve your goals.
displays thousands of publicly accessible S3 buckets
Search across a half million git repos
Homebrew installs the stuff you need that Apple (or your Linux system) didn’t. It is indispensable, and you don't even need root privileges to use it to install binaries in your user environment.
How to Learn Linux? (from Zero to Hero), a guide for learning Linux
IAM Vulnerable uses the Terraform binary and your AWS credentials to deploy over 250 IAM resources into your selected AWS account.
A guide explains provisioning certificates for your EKS / Kubernetes Cluster.
Basic iptables howto Iptables is a firewall, installed by default on all official Ubuntu distributions (Ubuntu, Kubuntu, Xubuntu).
Kubernetes Local Security Testing Lab
This tutorial walks you through setting up Kubernetes the hard way. This guide is not for someone looking for a fully automated tool to bring up a Kubernetes cluster.
LeakIX is a red-team search engine indexing mis-configurations and vulnerabilities online.
Ultimate Guide to Logging - Your open-source resource for understanding, analyzing, and troubleshooting system logs
What Linux logs are, where they’re located, and how to interpret them.
Linux Survival is a free tutorial designed to make it as easy as possible to learn Linux.
All about Microsoft credentials
minikube quickly sets up a local Kubernetes cluster on macOS, Linux, and Windows. It's a fast, free and easy way to play with a local Kubernetes cluster.
Use CLIs to interact with the three most popular cloud platforms: Amazon Web Services (AWS), Microsoft Azure, and the Google Cloud Platform (GCP)
This comprehensive multicloud cheat sheet covers multicloud use cases, top vendors, benefits, pros, cons and more.
A security bookmarks collection. All that things needed to pass OSCP, maybe
Self-Hosted Open Source Threat Intelligence platform
The OWASP® Foundation works to improve the security of software through its community-led open source software projects, hundreds of chapters worldwide, tens of thousands of members, and by hosting local and global conferences.
Packet Storm provides around-the-clock information and tools in order to help mitigate both personal data and fiscal loss on a global scale.
Taking the monkey work out of pentesting
An educational pivoting handbook for cyber threat intelligence analysts developed by Amitai Cohen.
A simple, interactive and fun playground to learn Kubernetes
Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.
Search any domain, IP, or URL and enrich on-demand with passive and active scans to inform your investigation.
OPA is a General Purpose Open Source Policy Engine, and Rego is the language it uses. This is a playground to learn how to write Rego.
Quickly compare your resume to a job and receive a snapshot of how well you match and guidance to make critical improvements before you apply.
Find vulnerabilities in this application before it finds its way into production. Also, ensure that proper logging is in place to allow analysts to identify attackers abusing this application.
Helping you find real world examples of functions, API's and libraries in 243 languages across 10+ public code sources
Incredibly useful interactive map of security certifications.
DNS data lookup
Shodan is the world's first search engine for Internet-connected devices.
T-Pot is the all in one, optionally distributed, multiarch (amd64, arm64) honeypot plattform, supporting 20+ honeypots and countless visualization options using the Elastic Stack, animated live attack maps and lots of security tools to further improve the deception experience.
Thunder CTF allows players to practice attacking vulnerable cloud projects on Google Cloud Platform (GCP).
The tldr pages are a community effort to simplify the beloved man pages of linux with practical examples.
A comprehensive TryHackMe learning path with organized sections on Introductory Rooms, Linux Fundamentals, Networking, Forensics, CTF challenges, Scripting, and more.
Online training, specifically for cloud.
A sandbox for the web
Vulhub is an open-source collection of pre-built vulnerable docker environments.
This cheatsheet is aimed at CTF players and beginners to help them understand the fundamentals of privilege escalation with examples.
Explore more than 916 billion web pages saved over time
Introduction to Kubernetes. Great tutorial from IBM.
Wireless Networks Database
Amazing list of open roles across the industry.
Cloud Security Podcast & Newsletter by Cloudsec Pros, for Cloudsec Pros
Quite possibly the best blog on cloud security, anywhere.
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques.
CloudSec Academy is your guide to navigating the alphabet soup of cloud security acronyms and industry jargon.
A cloud security Capture The Flag (CTF) event. The mission? To identify and learn about common Amazon EKS security issues.
CTF designed to challenge your Kubernetes hacking skills through a series of critical network vulnerabilities and misconfigurations.
Put yourself to the test with our unique CTF challenge and boost your AWS IAM knowledge. Do you have what it takes to win The Big IAM Challenge?
XAMPP is a completely free, easy to install Apache distribution containing MariaDB, PHP, and Perl.
Target search engine