anrbn / GATOR
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments
☆90Updated 9 months ago
Alternatives and similar repositories for GATOR:
Users that are interested in GATOR are comparing it to the libraries listed below
- C2 Automation using Linode☆80Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 6 months ago
- ☆77Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- PowerShell Reverse Shell☆61Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 11 months ago
- ☆51Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆40Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 2 months ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆48Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Artifact monitoring that ensures fairplay☆75Updated 2 months ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆83Updated 2 years ago
- ☆107Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- ☆34Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 7 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Some of my rough notes for Docker threat detection☆47Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆47Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- Lateral Movement☆122Updated last year