Prinzhorn / cloud-metadata-servicesLinks
List of metadata service endpoints for different cloud providers for your pentesting needs.
☆14Updated 6 years ago
Alternatives and similar repositories for cloud-metadata-services
Users that are interested in cloud-metadata-services are comparing it to the libraries listed below
Sorting:
- Pentester-focused Docker registry tool to enumerate and pull images☆109Updated 5 years ago
- ☆27Updated last month
- ☆57Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Burp Extension for AWS Signing☆89Updated 5 months ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- ☆29Updated 4 years ago
- ☆36Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Burp with Friends☆103Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- PowerShell module to play with Kerberos S4U extensions☆23Updated 7 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago