Pr0teus / aws-trail-recon
AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has
☆10Updated 10 months ago
Alternatives and similar repositories for aws-trail-recon:
Users that are interested in aws-trail-recon are comparing it to the libraries listed below
- Manage attack surface data on Elasticsearch☆22Updated last year
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 2 weeks ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated last week
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆19Updated this week
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- AI modular structure that provides automation-based attack and penetration☆14Updated 11 months ago
- A network logging tool that logs per process activities☆32Updated last year
- ☆19Updated last year
- A web security research tool for DOM testing☆20Updated this week
- ☆25Updated last week
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- ☆20Updated last week
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Tool for scanning domains for .git directories.☆14Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 6 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated 2 months ago
- Tool for fetching all the available waybackmachine snapshot urls☆21Updated 6 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆27Updated last week
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆28Updated 4 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 5 months ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆24Updated last month