A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.
☆155Nov 14, 2025Updated 6 months ago
Alternatives and similar repositories for IAMhounddog
Users that are interested in IAMhounddog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆83Feb 17, 2026Updated 3 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 3 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 3 weeks ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆134Apr 23, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Group Policy Objects manipulation and exploitation framework☆305Dec 7, 2025Updated 5 months ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆44May 8, 2026Updated last week
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆226Apr 14, 2025Updated last year
- ☆632Feb 5, 2026Updated 3 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆203Apr 10, 2026Updated last month
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆207Feb 11, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CLI tool for searching logs and unstructured content in Amazon S3 buckets☆221Jul 8, 2025Updated 10 months ago
- A cmake template for crystal palace☆40Dec 20, 2025Updated 4 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆217Apr 17, 2026Updated last month
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆422Apr 24, 2026Updated 3 weeks ago
- GitLab Attack TOolkit☆34Apr 24, 2026Updated 3 weeks ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Python implementation of select MicroBurst scripts.☆17Aug 19, 2021Updated 4 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆336Apr 8, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 10 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated 2 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆204Mar 17, 2026Updated 2 months ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆109Sep 4, 2025Updated 8 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆257Dec 18, 2025Updated 5 months ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆129Mar 27, 2026Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆44Jul 17, 2025Updated 10 months ago
- A collection of PoCs to do common things in unconventional ways☆122Aug 31, 2025Updated 8 months ago
- ☆219Dec 17, 2025Updated 5 months ago
- ☆24Mar 4, 2025Updated last year
- Rust crate to run commands as another user☆58Feb 12, 2026Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated 2 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Jul 13, 2025Updated 10 months ago