andresriancho / vpc-vpn-pivot
Pivot into private VPC networks using a VPN connection
☆41Updated 5 years ago
Alternatives and similar repositories for vpc-vpn-pivot:
Users that are interested in vpc-vpn-pivot are comparing it to the libraries listed below
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- AWS S3 Sensitive Data Search☆36Updated 3 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- ☆28Updated 8 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆90Updated 10 months ago
- ☆34Updated 4 years ago
- OAuth Security Cheatsheet☆39Updated 10 years ago
- Yet another open S3 bucket finder☆20Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆20Updated 5 years ago
- Burp Extension for AWS Signing☆87Updated last month
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆35Updated 6 years ago