A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.
☆153Nov 14, 2025Updated 5 months ago
Alternatives and similar repositories for IAMhounddog
Users that are interested in IAMhounddog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Updated this week
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆72Feb 17, 2026Updated 2 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 10 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Apr 10, 2026Updated last week
- Group Policy Objects manipulation and exploitation framework☆299Dec 7, 2025Updated 4 months ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated 2 weeks ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆228Apr 14, 2025Updated last year
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆200Apr 10, 2026Updated last week
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆202Feb 11, 2026Updated 2 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆625Feb 5, 2026Updated 2 months ago
- CLI tool for searching logs and unstructured content in Amazon S3 buckets☆218Jul 8, 2025Updated 9 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆409Updated this week
- A cmake template for crystal palace☆40Dec 20, 2025Updated 4 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆216Jan 12, 2026Updated 3 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python implementation of select MicroBurst scripts.☆15Aug 19, 2021Updated 4 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆336Apr 8, 2026Updated last week
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆122Mar 27, 2026Updated 3 weeks ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆203Mar 17, 2026Updated last month
- AWS honey token manager☆90Aug 1, 2024Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 7 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆250Dec 18, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- ☆44Jul 17, 2025Updated 9 months ago
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 7 months ago
- Rust crate to run commands as another user☆54Feb 12, 2026Updated 2 months ago
- ☆216Dec 17, 2025Updated 4 months ago
- ☆23Mar 4, 2025Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆120Mar 16, 2026Updated last month