JOSHUAJEBARAJ / GCP-GOATView external linksLinks
GCP GOAT is the vulnerable application for learn the GCP Security
☆70May 20, 2025Updated 8 months ago
Alternatives and similar repositories for GCP-GOAT
Users that are interested in GCP-GOAT are comparing it to the libraries listed below
Sorting:
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆412Oct 6, 2025Updated 4 months ago
- ☆14Aug 19, 2023Updated 2 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆553May 26, 2023Updated 2 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆428Oct 29, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- Awesome list for cloud security related projects☆150Oct 4, 2022Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- ☆51Jun 13, 2024Updated last year
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated 9 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated last month
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Nov 12, 2025Updated 3 months ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 3 months ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Jun 6, 2024Updated last year
- ☆13Oct 3, 2023Updated 2 years ago
- A toolkit for your red team operations☆34Oct 24, 2021Updated 4 years ago
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- ☆14Dec 26, 2022Updated 3 years ago