This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastructure, its various services and overall AWS cloud penetration testing.
☆12Jun 12, 2019Updated 6 years ago
Alternatives and similar repositories for AWS-Offensive-Exploitation---Pentesting
Users that are interested in AWS-Offensive-Exploitation---Pentesting are comparing it to the libraries listed below
Sorting:
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- Collection of templates for linux☆10Jun 2, 2024Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆56Mar 7, 2022Updated 4 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 3 years ago
- Roadmap to become a Linux-Fine☆10Jul 13, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆147May 24, 2022Updated 3 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.☆22May 4, 2023Updated 2 years ago
- Getting Started with Docker☆15Oct 30, 2016Updated 9 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆206Feb 16, 2021Updated 5 years ago
- ☆10Feb 21, 2022Updated 4 years ago
- Info for the Linux Academy AWS Cloud Practitioner Study group!☆14Sep 25, 2019Updated 6 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- A Nim library to generate random numbers and random ranges of bytes using the system's PRNG.☆12Oct 3, 2018Updated 7 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- Learning content, resources, and notes to obtain my AWS Cloud Practitioner Certification.☆15Mar 25, 2019Updated 6 years ago
- Modula-2 Preprocessor☆12Jun 14, 2021Updated 4 years ago
- ☆67Apr 20, 2022Updated 3 years ago
- How to install a PCE simplified.☆17Jan 11, 2026Updated 2 months ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- ☆11Jul 29, 2025Updated 7 months ago
- Arnab Chatterjee's Portfolio - Version 2 - NextJS | NextUI☆17Aug 21, 2023Updated 2 years ago
- Python3 script to interact with and retrieve data about your FordPass enabled vehicle☆12Apr 4, 2021Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago