XMCyber / AWSCloudSimulation
☆24Updated last year
Alternatives and similar repositories for AWSCloudSimulation:
Users that are interested in AWSCloudSimulation are comparing it to the libraries listed below
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Burp Extension for AWS Signing☆87Updated 3 weeks ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆75Updated 2 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 7 months ago
- ☆38Updated 4 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- ☆24Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- ☆55Updated 4 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆29Updated 7 years ago
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆35Updated 8 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- ☆34Updated 4 years ago
- A vulnerability reporting database to help pentesters write consistent, easy reports.☆9Updated 9 years ago
- ☆43Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- A proof of concept for delivering webbugs via AWS lambda☆43Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆34Updated 5 years ago