barq: The AWS Cloud Post Exploitation framework!
☆388Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for barq
Users that are interested in barq are comparing it to the libraries listed below
Sorting:
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆994Oct 4, 2022Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Feb 24, 2026Updated last week
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆497Nov 10, 2022Updated 3 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- Exploits written by the Rhino Security Labs team☆1,095Jan 23, 2021Updated 5 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- A toolkit to attack Office365☆1,116Nov 6, 2020Updated 5 years ago
- Enumerate the permissions associated with AWS credential set☆1,222Feb 5, 2024Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- Cloud-related research releases from the Rhino Security Labs team.☆392Apr 23, 2020Updated 5 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆95Mar 18, 2024Updated last year
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Oct 28, 2023Updated 2 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,405Oct 16, 2025Updated 4 months ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- AWS Account Manager Email Manager Manager☆21Aug 20, 2019Updated 6 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- Security auditing tool for Azure environments☆584Nov 4, 2022Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 4 months ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- ☆102May 5, 2020Updated 5 years ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆883Feb 23, 2026Updated last week
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,077Mar 19, 2024Updated last year