avishayil / caponemeView external linksLinks
Repository demonstrating the Capital One breach on your AWS account
☆245Feb 8, 2021Updated 5 years ago
Alternatives and similar repositories for caponeme
Users that are interested in caponeme are comparing it to the libraries listed below
Sorting:
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆994Oct 4, 2022Updated 3 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- peerd is an AWS VPC Peering Connection management tool. It creates full-meshes of VPCs from a yaml file, and manages the full lifecycle o…☆136Apr 4, 2025Updated 10 months ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Nov 19, 2023Updated 2 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A collection of AWS penetration testing junk☆1,217Aug 30, 2023Updated 2 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 5 years ago
- AWS Security Tools (AST) in a simple Docker container.☆284May 20, 2021Updated 4 years ago
- Resource types that can be publicly exposed on AWS☆329Feb 23, 2022Updated 3 years ago
- ☆140Mar 29, 2023Updated 2 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- Fuzzing for LFI using Burpsuite☆67Oct 4, 2016Updated 9 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Security aspects of AWS products for the Security Specialist certification☆211May 12, 2022Updated 3 years ago
- Declarative penetration testing orchestration framework☆295Dec 20, 2019Updated 6 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆752Oct 14, 2023Updated 2 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆641Apr 29, 2021Updated 4 years ago
- Burp Suite extension to help make Graphql request more readable☆33Dec 7, 2017Updated 8 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago