PacktPublishing / Hands-On-AWS-Penetration-Testing-with-Kali-Linux
Hands-On AWS Penetration Testing with Kali Linux published by Packt
☆128Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Hands-On-AWS-Penetration-Testing-with-Kali-Linux
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆168Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆133Updated 4 years ago
- Amazon bucket brute force tool☆95Updated 11 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆356Updated 4 years ago
- AWS S3 Bucket/Object Finder☆116Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆89Updated 8 months ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆135Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆168Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆141Updated 4 years ago
- Pentesting/Bugbounty Dockerfiles.☆173Updated 3 years ago
- ☆273Updated 3 years ago
- Just a collection of pentest stuffs☆96Updated 4 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆136Updated last year
- Damn Vulnerable Cloud Application☆187Updated 6 years ago
- ☆44Updated 2 months ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆71Updated 2 years ago
- Some good resources for getting started with application security☆135Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Updated 4 years ago
- AWS Certified Security Specialty (2020) course notes☆115Updated 4 years ago
- A tool to enumerate S3 buckets manually or via certstream☆80Updated last year
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆30Updated 6 years ago
- Custom checklists, cheatsheets, links, and scripts☆126Updated 5 years ago
- Collection of OSCP study material && tools.☆77Updated 5 years ago
- ☆99Updated 4 years ago
- How to prepare for OSCP complete guide☆128Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆98Updated 11 months ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago