barq: The AWS Cloud Post Exploitation framework!
☆388Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for barq
Users that are interested in barq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆927Jul 25, 2019Updated 6 years ago
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,001Oct 4, 2022Updated 3 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,128Mar 30, 2026Updated 2 weeks ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆649Nov 21, 2019Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆499Nov 10, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- Exploits written by the Rhino Security Labs team☆1,099Jan 23, 2021Updated 5 years ago
- Enumerate the permissions associated with AWS credential set☆1,231Feb 5, 2024Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,548Aug 2, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- A toolkit to attack Office365☆1,119Nov 6, 2020Updated 5 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Apr 23, 2020Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆95Mar 18, 2024Updated 2 years ago
- ☆102May 5, 2020Updated 5 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,427Oct 16, 2025Updated 5 months ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Search exposed EBS volumes for secrets☆301Apr 24, 2023Updated 2 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆640Apr 29, 2021Updated 4 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆318Mar 31, 2021Updated 5 years ago
- A simple SSRF-testing sheriff written in Go☆337Oct 31, 2024Updated last year
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆911Dec 17, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆888Feb 23, 2026Updated last month
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,019Updated this week
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago
- Security auditing tool for Azure environments☆583Nov 4, 2022Updated 3 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year