RhinoSecurityLabs / GCPBucketBruteLinks
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
☆530Updated 2 years ago
Alternatives and similar repositories for GCPBucketBrute
Users that are interested in GCPBucketBrute are comparing it to the libraries listed below
Sorting:
- ☆255Updated last year
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆251Updated 2 weeks ago
- Search exposed EBS volumes for secrets☆297Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆389Updated 5 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- Find AWS S3 buckets and test their permissions.☆392Updated 2 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,233Updated last year
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆396Updated last year
- These are the regexes that power truffleHog☆217Updated 2 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆179Updated 2 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆373Updated last year
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆215Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆526Updated 3 years ago
- WeirdAAL (AWS Attack Library)☆816Updated 6 months ago
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆379Updated last year
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆754Updated 10 months ago
- Awesome cloud enumerator☆1,027Updated 4 months ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆242Updated 5 years ago
- Damn Vulnerable Cloud Application☆197Updated 6 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆296Updated 2 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆635Updated 5 years ago
- An automated target reconnaissance pipeline.☆435Updated 2 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆352Updated 4 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆541Updated 2 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆172Updated 6 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆152Updated 4 years ago
- ☆598Updated last year
- Identify privilege escalation paths within and across different clouds☆698Updated last month