A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.
☆145Nov 14, 2025Updated 3 months ago
Alternatives and similar repositories for IAMhounddog
Users that are interested in IAMhounddog are comparing it to the libraries listed below
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Group Policy Objects manipulation and exploitation framework☆292Dec 7, 2025Updated 2 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆226Apr 14, 2025Updated 10 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆69Feb 17, 2026Updated 2 weeks ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆193Feb 17, 2026Updated 2 weeks ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆180Feb 11, 2026Updated 3 weeks ago
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆70Oct 30, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆317Feb 8, 2026Updated 3 weeks ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆214Jan 12, 2026Updated last month
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- ☆23Mar 4, 2025Updated last year
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated last week
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- ☆23Sep 20, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- A modern open-source Kubernetes auditing and investigation tool☆21Sep 17, 2025Updated 5 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- ☆620Feb 5, 2026Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated 2 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 10 months ago