A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.
☆415Oct 6, 2025Updated 5 months ago
Alternatives and similar repositories for GCP-IAM-Privilege-Escalation
Users that are interested in GCP-IAM-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆556May 26, 2023Updated 2 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,080Feb 24, 2026Updated last week
- GCP GOAT is the vulnerable application for learn the GCP Security☆71May 20, 2025Updated 9 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆288May 16, 2025Updated 9 months ago
- A utility to convert your AWS CLI credentials into AWS console access.☆257May 7, 2020Updated 5 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,535Feb 5, 2026Updated last month
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Feb 6, 2025Updated last year
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- A collection of scripts for assessing Microsoft Azure security☆2,313Oct 29, 2025Updated 4 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆432Oct 29, 2024Updated last year
- Automating situational awareness for cloud penetration tests.☆2,299Mar 2, 2026Updated last week
- Multi-Cloud Security Auditing Tool☆7,562Sep 23, 2025Updated 5 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,490Feb 12, 2026Updated 3 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,803Sep 17, 2024Updated last year
- Cloud Security Posture Management (CSPM)☆3,711Feb 23, 2026Updated 2 weeks ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆908Dec 17, 2024Updated last year
- Azure Security Resources and Notes☆1,713Feb 17, 2026Updated 2 weeks ago
- This program will connect to Google's API using an access token and inject a calendar event into a target's calendar.☆18Oct 9, 2019Updated 6 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆645Nov 21, 2019Updated 6 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,034Jul 12, 2025Updated 7 months ago
- A comprehensive scanner for Google Cloud☆353Dec 5, 2025Updated 3 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆755Oct 14, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Mar 1, 2026Updated last week
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,078Mar 19, 2024Updated last year
- ☆755Aug 26, 2022Updated 3 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆628Mar 21, 2025Updated 11 months ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆782Aug 26, 2025Updated 6 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated 2 weeks ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,263Mar 19, 2025Updated 11 months ago
- Tools and blogs I use to perform GCP red teams☆138Jul 23, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- ☆139Mar 29, 2023Updated 2 years ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated last month
- Peirates - Kubernetes Penetration Testing tool☆1,425Jan 20, 2026Updated last month
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago