RhinoSecurityLabs / pacuLinks
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
☆4,942Updated 2 months ago
Alternatives and similar repositories for pacu
Users that are interested in pacu are comparing it to the libraries listed below
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,354Updated last month
- Multi-Cloud Security Auditing Tool☆7,387Updated last month
- Cloud Security Posture Management (CSPM)☆3,626Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,219Updated last week
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,943Updated last week
- A tool for quickly evaluating IAM permissions in AWS.☆1,523Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,168Updated 3 weeks ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,314Updated last week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,753Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,926Updated 5 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆922Updated 6 years ago
- A collection of AWS penetration testing junk☆1,208Updated 2 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,223Updated 2 weeks ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆978Updated 3 years ago
- Notes about attacking Jenkins servers☆2,082Updated last year
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,144Updated last week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,943Updated 3 months ago
- Exploits written by the Rhino Security Labs team☆1,081Updated 4 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆731Updated 2 years ago
- WeirdAAL (AWS Attack Library)☆826Updated 9 months ago
- A curated list of amazingly awesome Burp Extensions☆3,292Updated 8 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,390Updated 8 months ago
- Enumerate the permissions associated with AWS credential set☆1,191Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,294Updated last year
- Security Tool to Look For Interesting Files in S3 Buckets☆1,437Updated last year
- A collaborative, multi-platform, red teaming framework☆4,035Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,364Updated 3 weeks ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,140Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,487Updated 2 weeks ago
- Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, sec…☆12,208Updated this week