A tool to keep AWS pentests and red teams efficient, organized, and stealthy.
☆96Dec 29, 2025Updated 3 months ago
Alternatives and similar repositories for AWSealion
Users that are interested in AWSealion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆146May 24, 2022Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,000May 20, 2025Updated 10 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My cheatsheet notes to pentest AWS infrastructure☆704Oct 17, 2022Updated 3 years ago
- Azure and AWS Attacks☆1,117Nov 25, 2022Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,340Updated this week
- Cybersecurity Notes☆167Apr 11, 2024Updated 2 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Apr 2, 2026Updated 2 weeks ago
- ☆140Mar 29, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,036Feb 9, 2026Updated 2 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- ☆31May 31, 2022Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Nov 3, 2021Updated 4 years ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆336Aug 28, 2024Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆685Oct 23, 2025Updated 5 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated 2 weeks ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,503Apr 3, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,077Feb 1, 2024Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆370Jun 24, 2025Updated 9 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆283Jan 14, 2023Updated 3 years ago