Pr0teus / aws-trail-recon
AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has
☆9Updated 9 months ago
Alternatives and similar repositories for aws-trail-recon:
Users that are interested in aws-trail-recon are comparing it to the libraries listed below
- Manage attack surface data on Elasticsearch☆22Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- Tool for scanning domains for .git directories.☆13Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆18Updated 4 months ago
- A network logging tool that logs per process activities☆32Updated last year
- AI modular structure that provides automation-based attack and penetration☆15Updated 9 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 7 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆19Updated 3 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 10 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 6 months ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated 4 months ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- ☆19Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆40Updated 2 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- ☆32Updated last year
- Breaking Active Directory Security with 🍞☆31Updated 3 months ago
- A user enumeration tool for Slack.☆24Updated 8 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆22Updated 10 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- ☆16Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated last year