A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.
☆149Nov 14, 2025Updated 4 months ago
Alternatives and similar repositories for IAMhounddog
Users that are interested in IAMhounddog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆70Feb 17, 2026Updated last month
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆123Mar 18, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 3 months ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆228Apr 14, 2025Updated 11 months ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆195Feb 11, 2026Updated last month
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆200Mar 18, 2026Updated last week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Mar 16, 2026Updated last week
- ☆625Feb 5, 2026Updated last month
- Python implementation of select MicroBurst scripts.☆14Aug 19, 2021Updated 4 years ago
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 2 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated 2 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆200Mar 17, 2026Updated last week
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆242Dec 18, 2025Updated 3 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 6 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆43Jul 17, 2025Updated 8 months ago
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 6 months ago
- Rust crate to run commands as another user☆54Feb 12, 2026Updated last month
- ☆216Dec 17, 2025Updated 3 months ago
- ☆23Mar 4, 2025Updated last year
- CLI tool for searching logs and unstructured content in Amazon S3 buckets☆216Jul 8, 2025Updated 8 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆120Mar 16, 2026Updated last week