andresriancho / vpc-vpn-pivot
Pivot into private VPC networks using a VPN connection
☆41Updated 5 years ago
Alternatives and similar repositories for vpc-vpn-pivot:
Users that are interested in vpc-vpn-pivot are comparing it to the libraries listed below
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- ☆34Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- ☆28Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- AWS S3 Sensitive Data Search☆36Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- ☆20Updated 5 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆46Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 9 months ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- ☆38Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year