A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).
☆60Apr 10, 2024Updated last year
Alternatives and similar repositories for GCP-Attack-Defense
Users that are interested in GCP-Attack-Defense are comparing it to the libraries listed below
Sorting:
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆193Dec 14, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆394Oct 6, 2024Updated last year
- ☆84Nov 21, 2024Updated last year
- Slide decks and/or materials from conference presentations☆56Nov 15, 2022Updated 3 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆233Oct 8, 2024Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆126Updated this week
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆20Jul 17, 2022Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆386Feb 23, 2024Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated last month
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Dec 7, 2025Updated 3 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago