Pr0teus / aws-trail-recon
AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has
☆14Updated last year
Alternatives and similar repositories for aws-trail-recon
Users that are interested in aws-trail-recon are comparing it to the libraries listed below
Sorting:
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated last month
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆13Updated 2 weeks ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆26Updated last week
- ☆20Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆35Updated last month
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆13Updated last month
- Tools used for Pentesting☆22Updated 2 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆36Updated 2 weeks ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆18Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆27Updated 10 months ago
- ☆32Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A web security research tool for DOM testing☆20Updated this week
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 2 months ago
- Challenge Python☆19Updated 2 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Burp Extension to identify PII data☆21Updated 4 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 months ago