CyberSecArmy / AWS-Offensive-Exploitation---PentestingLinks
This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastructure, its various services and overall AWS cloud penetration testing.
☆11Updated 6 years ago
Alternatives and similar repositories for AWS-Offensive-Exploitation---Pentesting
Users that are interested in AWS-Offensive-Exploitation---Pentesting are comparing it to the libraries listed below
Sorting:
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- ☆28Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- AWS Security Checks☆39Updated 7 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆19Updated 6 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- ☆22Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- ☆17Updated 4 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- ☆35Updated 2 months ago
- Web application pentesting recon☆23Updated 4 years ago
- ☆14Updated 4 years ago
- ☆23Updated 2 years ago
- Penetration Testing Methodology - short notes☆11Updated 10 years ago
- ☆22Updated 2 years ago