LowOrbitSecurity / gubbleLinks
gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post messages, view conversations, and more to help identify potential security risks associated with group configurations.
☆79Updated 4 months ago
Alternatives and similar repositories for gubble
Users that are interested in gubble are comparing it to the libraries listed below
Sorting:
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆46Updated 3 weeks ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 5 months ago
- Hijack a slack bot to phish your way in☆57Updated 2 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆93Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 8 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆105Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- Cloud subdomains identification tool☆60Updated 5 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- Living Off Security Tools☆51Updated 11 months ago
- Dredging up secrets from the depths of the file system☆131Updated 11 months ago
- Putting a leash on naughty AWS permissions☆130Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago
- FrogPost: postMessage Security Testing Tool☆96Updated 2 weeks ago
- ☆106Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated last month
- Addon for BHCE☆53Updated 6 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 4 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆34Updated 3 weeks ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated 11 months ago
- ☆78Updated last year
- Protection against HTML smuggling attacks.☆99Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 10 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year