Prinzhorn / cloud-metadata-services
List of metadata service endpoints for different cloud providers for your pentesting needs.
☆14Updated 5 years ago
Alternatives and similar repositories for cloud-metadata-services:
Users that are interested in cloud-metadata-services are comparing it to the libraries listed below
- A git submodule list containing all the tools repo's you'll ever need.☆28Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆75Updated 4 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆105Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- ☆58Updated last year
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- A simple remote scanner for Liferay Portal☆18Updated last year
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Updated 5 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.☆47Updated 4 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- 👊 A small utility to play with IBM MQ☆63Updated last year
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Burp with Friends☆100Updated 2 years ago
- Dockerfiles for security tools☆49Updated 2 months ago
- A Go client for crobat☆24Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 7 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago