CyberSecArmy / AWS-Offensive-Exploitation---PentestingLinks
This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastructure, its various services and overall AWS cloud penetration testing.
☆11Updated 6 years ago
Alternatives and similar repositories for AWS-Offensive-Exploitation---Pentesting
Users that are interested in AWS-Offensive-Exploitation---Pentesting are comparing it to the libraries listed below
Sorting:
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 months ago
- Virtual Security Operations Center☆51Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆137Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆28Updated 6 years ago
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Updated last year
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Updated 4 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆77Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 11 months ago
- ☆90Updated 3 years ago
- 📚A curated list of product security resources.☆20Updated last month
- ☆15Updated 3 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- ☆44Updated 9 years ago
- ☆24Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year