Proof of Concept Zappa Based AWS Persistence and Attack Platform
☆40Jun 26, 2020Updated 5 years ago
Alternatives and similar repositories for mad-king
Users that are interested in mad-king are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Jun 26, 2020Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆346Jul 23, 2021Updated 4 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Sep 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 4 months ago
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆29Jan 14, 2026Updated 3 months ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Mal4s is a free open source data visualization tool designed to make it easy to see clusters of related Internet resources.☆32Mar 23, 2026Updated 3 weeks ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Jul 22, 2016Updated 9 years ago
- Library and tools to access the Master Boot Record (MBR) volume system format☆14Dec 21, 2025Updated 3 months ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Utilities for locally running and testing Python AWS Lambda functions☆15Sep 10, 2017Updated 8 years ago
- Write detections, investigate alerts, and query logs from your favorite AI agents☆42Apr 6, 2026Updated last week
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Aug 9, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆499Nov 10, 2022Updated 3 years ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Library and tools to access the Windows (Vista/7) Explorer thumbnail cache database format (thumbcache.db)☆17Dec 3, 2025Updated 4 months ago
- Scrape Twitter for long hashtags that could be used as passwords☆10Jan 4, 2017Updated 9 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- Cloud Security Tools☆16Aug 17, 2020Updated 5 years ago
- Enforce ownership and data security within AWS☆446Oct 7, 2020Updated 5 years ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆47Feb 27, 2019Updated 7 years ago
- ☆41Jul 20, 2015Updated 10 years ago