RhinoSecurityLabs / pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
☆4,475Updated 2 months ago
Alternatives and similar repositories for pacu:
Users that are interested in pacu are comparing it to the libraries listed below
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,040Updated this week
- Automating situational awareness for cloud penetration tests.☆1,998Updated 2 weeks ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆1,791Updated 2 weeks ago
- Multi-Cloud Security Auditing Tool☆6,862Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,608Updated 4 months ago
- Cloud Security Posture Management (CSPM)☆3,398Updated this week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,044Updated 2 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,642Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,445Updated 5 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,779Updated 2 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,727Updated 3 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆903Updated 5 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,884Updated this week
- A collection of AWS penetration testing junk☆1,181Updated last year
- Exploits written by the Rhino Security Labs team☆1,067Updated 3 years ago
- Open Source Vulnerability Management Platform☆5,153Updated this week
- Notes about attacking Jenkins servers☆2,018Updated 6 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆927Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆4,964Updated last week
- WeirdAAL (AWS Attack Library)☆792Updated this week
- A collaborative, multi-platform, red teaming framework☆3,373Updated 2 weeks ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,405Updated 4 months ago
- A Tool for Domain Flyovers☆5,694Updated 2 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,461Updated 2 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,195Updated 9 months ago
- Adversary Emulation Framework☆8,782Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,106Updated 2 months ago
- Automated Adversary Emulation Platform☆5,786Updated last week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,094Updated 3 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,132Updated last month