This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.
☆221Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for Cloud-Pentesting
Users that are interested in Cloud-Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 30, 2021Updated 4 years ago
- ☆758Aug 26, 2022Updated 3 years ago
- PDF slides☆248Aug 19, 2021Updated 4 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Azure Security Resources and Notes☆1,734Feb 17, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Apr 6, 2026Updated last week
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆419Oct 6, 2025Updated 6 months ago
- ☆137Jul 9, 2021Updated 4 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆277Jun 27, 2025Updated 9 months ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,698Jan 8, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆48Feb 21, 2021Updated 5 years ago
- Mind-Maps of Several Things☆2,635Jun 29, 2023Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Complite Web Application Penetration Testing☆28Jul 9, 2021Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,393Mar 17, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,944Oct 7, 2023Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆56Mar 7, 2022Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- ☆241Jun 10, 2021Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆544Aug 4, 2022Updated 3 years ago
- ☆88May 27, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,995Sep 5, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆964Dec 31, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,485Oct 12, 2024Updated last year