IP to CloudProvider
This command-line tool helps to manage and check IP ranges for various service providers. It allows you to update IP ranges for specific providers, check if an IP belongs to any provider’s range, and even verify a list of IPs from a file. Some GitHub Actions are helping to create a nice workflow around the CLI-Tool.
In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. A critical component of this proactive defense is identifying and mitigating vulnerabilities in your system before they can be exploited by malicious actors. The CVE PrioMarble tool emerges as a valuable asset in your arsenal, offering a novel approach to vulnerability prioritization by harnessing the power of CVSS, EPSS, and CISA’s Known Exploited Vulnerabilities catalog.
CloudTrail is the central logging source for each AWS account. It provides a perfect foundation for creating threat hunting queries, which can be used for offline analysis or integrated into a SIEM based on Athena, (H)ELK, Splunk, or a custom solution.
Greetings, fellow defenders of the digital realm! Today, we’re diving into a unique and captivating approach to threat modeling that draws inspiration from the world of the Dark Knight himself - Batman. I’m excited to introduce you with this workshop into the concept of a Batman-themed threat modeling workshop. Just like Batman meticulously plans for every possible threat in Gotham City, I’ll guide you through the process of identifying, assessing, and mitigating security risks in your projects using a touch of Batman flair.
Mirroring
CyberChef is a powerful tool that can be used for a variety of tasks. It is easy to use and has a wide range of features, making it a valuable addition to any security toolkit.
After playing around with ChatGPT and f.e. created some CloudCustodian policies, Splunk queries and other cool things like unit tests for written code, it’s time to move on to something else. Since IAM is the killer feature, but also the killer feature - we could simply use the APIs and get some automated feedback. This isn’t entirely automated yet but still a lot of fun to see. The results are nearly always very precise and astonishing. I used
Follow me through a journey across Mirai. In this slide deck you’ll learn starting from the history history across technical of the source code till the attack capabilities of Mirai. Next to the attack methods of Mirai, the code also contains some curiosities like Rick Rolling and russian comments. The territorial predator capabilities of the botnet gives also a glimpse to the psyche of the authors based on the leakage of the code.
A short review on the history of Containers at a glance. If you take one step back from docker you’ll probably read about
Tiny collection of scripts to isolate an EC2 instance and start with the joy of forensics. In the case of a compromised EC2 instance within your fleet, it’s time for getting prepared for Incident Response and Threat Hunting. To get started you have two Options:
Ever wanted to become a Security Millionaire? Instead of money we play this time for the quota of a devastating DDoS-Attack. Guide me across common concerns, threats and issues in the cloud. Each of the ten questions also it’s knowledge base in the end. Can you master your way to the Top?
After reading the cheatsheet about
While crafting a new lab to learn more about sniffing through docker images, I had the idea to make things more realistic. Therefore the usage of

After creating some Templates for AWS it’s time to make a first step into Containerization. The created Docker Templates are based on