HBOCodeLabs / gimme-aws-credsLinks
A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials
☆10Updated 4 years ago
Alternatives and similar repositories for gimme-aws-creds
Users that are interested in gimme-aws-creds are comparing it to the libraries listed below
Sorting:
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- ☆29Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- Materials for AWS Training☆15Updated 4 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- ☆36Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 7 months ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Virtual Security Operations Center☆51Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- ☆14Updated last year
- Hostile Dropboxes Management☆26Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago