LowOrbitSecurity / gubbleLinks
gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post messages, view conversations, and more to help identify potential security risks associated with group configurations.
☆79Updated 7 months ago
Alternatives and similar repositories for gubble
Users that are interested in gubble are comparing it to the libraries listed below
Sorting:
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆138Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated last month
- ☆117Updated 2 weeks ago
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- Cloud subdomains identification tool☆62Updated 9 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆111Updated 4 months ago
- ☆40Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆108Updated 7 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- Living Off Security Tools☆58Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆59Updated 11 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 5 months ago
- Putting a leash on naughty AWS permissions☆132Updated 4 months ago
- ☆84Updated 2 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆52Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆46Updated 5 months ago
- Create honeypots for cloud environments☆109Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆64Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- FrogPost: postMessage Security Testing Tool☆105Updated last month