RhinoSecurityLabs / pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
☆4,592Updated this week
Alternatives and similar repositories for pacu:
Users that are interested in pacu are comparing it to the libraries listed below
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,129Updated this week
- Multi-Cloud Security Auditing Tool☆7,018Updated 4 months ago
- Automating situational awareness for cloud penetration tests.☆2,053Updated last week
- Cloud Security Posture Management (CSPM)☆3,461Updated 3 weeks ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,710Updated this week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,660Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,464Updated 7 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,120Updated 4 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,769Updated 5 months ago
- A collection of AWS penetration testing junk☆1,190Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆937Updated 2 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,393Updated 11 months ago
- A Tool for Domain Flyovers☆5,734Updated 2 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆907Updated 5 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,073Updated last month
- A curated list of amazingly awesome Burp Extensions☆3,101Updated last month
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,813Updated last month
- HTTP parameter discovery suite.☆5,520Updated last month
- Granular, Actionable Adversary Emulation for the Cloud☆1,957Updated this week
- Enumerate the permissions associated with AWS credential set☆1,137Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆686Updated last year
- Contextual Content Discovery Tool☆2,776Updated 10 months ago
- A collaborative, multi-platform, red teaming framework☆3,506Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,054Updated 3 weeks ago
- Notes about attacking Jenkins servers☆2,036Updated 8 months ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,323Updated 5 months ago
- Adversary Emulation Framework☆9,063Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,212Updated 5 months ago
- WeirdAAL (AWS Attack Library)☆797Updated 2 months ago
- Open Source Vulnerability Management Platform☆5,300Updated last week