This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.
☆221Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for Cloud-Pentesting
Users that are interested in Cloud-Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 30, 2021Updated 4 years ago
- ☆761Aug 26, 2022Updated 3 years ago
- PDF slides☆248Aug 19, 2021Updated 4 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Azure Security Resources and Notes☆1,741Feb 17, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated last month
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆419Oct 6, 2025Updated 7 months ago
- ☆138Jul 9, 2021Updated 4 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,701Jan 8, 2024Updated 2 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆279Jun 27, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆48Feb 21, 2021Updated 5 years ago
- Mind-Maps of Several Things☆2,650Jun 29, 2023Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆330Mar 27, 2024Updated 2 years ago
- Complite Web Application Penetration Testing☆28Jul 9, 2021Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Aug 11, 2023Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,409Mar 17, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,948Oct 7, 2023Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆56Mar 7, 2022Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- ☆241Jun 10, 2021Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆544Aug 4, 2022Updated 3 years ago
- ☆88May 27, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆2,001Sep 5, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆968Dec 31, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,493Oct 12, 2024Updated last year