barq: The AWS Cloud Post Exploitation framework!
☆388Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for barq
Users that are interested in barq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of AWS penetration testing junk☆1,221Aug 30, 2023Updated 2 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- WeirdAAL (AWS Attack Library)☆838Jan 13, 2025Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,000Oct 4, 2022Updated 3 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,110Updated this week
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆498Nov 10, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- Exploits written by the Rhino Security Labs team☆1,096Jan 23, 2021Updated 5 years ago
- Enumerate the permissions associated with AWS credential set☆1,229Feb 5, 2024Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- A toolkit to attack Office365☆1,118Nov 6, 2020Updated 5 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Apr 23, 2020Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆95Mar 18, 2024Updated 2 years ago
- ☆102May 5, 2020Updated 5 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,416Oct 16, 2025Updated 5 months ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆641Apr 29, 2021Updated 4 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆912Dec 17, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,012Mar 11, 2026Updated 2 weeks ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆884Feb 23, 2026Updated last month
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago
- Security auditing tool for Azure environments☆584Nov 4, 2022Updated 3 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year