WhiteOakSecurity / GoAWSConsoleSprayLinks
Tool to spray AWS Console IAM Logins
☆29Updated 3 years ago
Alternatives and similar repositories for GoAWSConsoleSpray
Users that are interested in GoAWSConsoleSpray are comparing it to the libraries listed below
Sorting:
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- ☆52Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Java archive implant toolkit.☆61Updated 2 months ago
- ☆31Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Lexmark CVE-2023-26067☆26Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆31Updated 4 months ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- ☆23Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- Putting the C2 in C2loudflare☆15Updated last year
- PoC☆12Updated 3 months ago
- You can check below blog post on attacks related to azure storage.☆13Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- ☆30Updated last week
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- ☆19Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- CVE-2024-23897 jenkins-cli☆15Updated last year