Skip to content
View RoseSecurity's full-sized avatar

Organizations

@lifechurch @cloudposse
Block or Report

Block or report RoseSecurity

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
RoseSecurity/README.md

LinkedIn Terraform AWS Components

Typing SVG

Important

Hey, I'm RoseSecurity!

My journey into the world of computing began as a cybersecurity network operator, where I developed intrusion detection systems to protect critical infrastructure, automated Blue Team vulnerability assessments, and even ventured into the Red Team space as an offensive operator and infrastructure engineer. It was during this time that I discovered my passion for building secure, scalable, and reliable cloud environments! Currently, I write Infrastructure-as-Code and automation to help startups and established companies quickly and securely build their cloud environments, but when I'm not building cloud networks, you can catch me conducting security research to identify modern tactics, techniques, and procedures used by malicious actors. If you enjoy my code, blogs, or tools, feel free to reach out and connect!


Typing SVG

Pinned

  1. Anti-Virus-Evading-Payloads Anti-Virus-Evading-Payloads Public

    During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, …

    673 82

  2. Red-Teaming-TTPs Red-Teaming-TTPs Public

    Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!

    1k 137

  3. ScrapPY ScrapPY Public

    ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing,…

    Python 183 19

  4. APOLOGEE APOLOGEE Public

    APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation …

    Python 45 8

  5. Abusing-Roku-APIs Abusing-Roku-APIs Public

    A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers how to enumerate devices, issue commands via "curl," and de…

    226 8

  6. WolfPack WolfPack Public

    WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.

    HCL 112 11