RhinoSecurityLabs / pacuLinks
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
☆5,057Updated 3 months ago
Alternatives and similar repositories for pacu
Users that are interested in pacu are comparing it to the libraries listed below
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,464Updated 2 weeks ago
- Multi-Cloud Security Auditing Tool☆7,532Updated 4 months ago
- Automating situational awareness for cloud penetration tests.☆2,289Updated last week
- Cloud Security Posture Management (CSPM)☆3,694Updated 2 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,991Updated 2 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,399Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,539Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,966Updated 8 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Updated last week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Updated last year
- A collection of AWS penetration testing junk☆1,216Updated 2 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Updated 6 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,507Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,180Updated this week
- Automated Adversary Emulation Platform☆6,733Updated this week
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆754Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,012Updated 7 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆995Updated 3 years ago
- Notes about attacking Jenkins servers☆2,090Updated last year
- WeirdAAL (AWS Attack Library)☆837Updated last year
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,165Updated 3 years ago
- Enumerate the permissions associated with AWS credential set☆1,218Updated 2 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,456Updated last year
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆12,929Updated last week
- Open Source Vulnerability Management Platform☆6,255Updated 2 weeks ago
- Exploits written by the Rhino Security Labs team☆1,093Updated 5 years ago
- DNS Enumeration Script☆2,946Updated this week
- Adversary Emulation Framework☆10,673Updated this week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,792Updated 6 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,440Updated 4 months ago