This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.
☆221Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for Cloud-Pentesting
Users that are interested in Cloud-Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 30, 2021Updated 4 years ago
- ☆757Aug 26, 2022Updated 3 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Azure Security Resources and Notes☆1,717Feb 17, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year
- ☆34Jun 23, 2021Updated 4 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆416Oct 6, 2025Updated 5 months ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆271Jun 27, 2025Updated 9 months ago
- ☆138Jul 9, 2021Updated 4 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,692Jan 8, 2024Updated 2 years ago
- ☆48Feb 21, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Mind-Maps of Several Things☆2,632Jun 29, 2023Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated 2 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆183Nov 22, 2021Updated 4 years ago
- Complite Web Application Penetration Testing☆28Jul 9, 2021Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,377Mar 17, 2026Updated last week
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆56Mar 7, 2022Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- ☆241Jun 10, 2021Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆542Aug 4, 2022Updated 3 years ago
- ☆88May 27, 2021Updated 4 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,985Sep 5, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆959Dec 31, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago