☆731Updated this week
Alternatives and similar repositories for hacktricks-cloud
Users that are interested in hacktricks-cloud are comparing it to the libraries listed below
Sorting:
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,923Updated this week
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated 3 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,027Jul 12, 2025Updated 7 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,802Sep 17, 2024Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆345Mar 4, 2025Updated 11 months ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,528Feb 10, 2026Updated 2 weeks ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,155Updated this week
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,178Dec 27, 2023Updated 2 years ago
- Azure Security Resources and Notes☆1,711Feb 17, 2026Updated last week
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,005Feb 16, 2026Updated last week
- ☆97Jul 23, 2025Updated 7 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,092Jan 31, 2026Updated last month
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,528Feb 5, 2026Updated 3 weeks ago
- Red Teaming Tactics and Techniques☆4,491Aug 22, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,301Feb 15, 2026Updated last week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,975May 20, 2025Updated 9 months ago
- Enumerate AWS permissions and resources.☆71Jun 23, 2022Updated 3 years ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,864Oct 1, 2025Updated 4 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆505Jul 17, 2022Updated 3 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated last week
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,487Feb 12, 2026Updated 2 weeks ago
- Awesome cloud enumerator☆1,098Mar 9, 2025Updated 11 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,401Feb 18, 2026Updated last week
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆89May 2, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,182Jan 5, 2026Updated last month
- Active Directory certificate abuse.☆1,915Oct 27, 2025Updated 4 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆671Oct 23, 2025Updated 4 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,258Mar 19, 2025Updated 11 months ago
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Updated this week
- My cheatsheet notes to pentest AWS infrastructure☆703Oct 17, 2022Updated 3 years ago
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- Rockyou for web fuzzing☆3,023Feb 11, 2026Updated 2 weeks ago