bassammaged / awsEnumView external linksLinks
Enumerate AWS cloud resources based on provided credential
☆51May 11, 2022Updated 3 years ago
Alternatives and similar repositories for awsEnum
Users that are interested in awsEnum are comparing it to the libraries listed below
Sorting:
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- ☆109Feb 21, 2023Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 10 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85May 7, 2023Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24May 20, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Nov 30, 2022Updated 3 years ago
- Source Code Management Attack Toolkit☆225Sep 20, 2022Updated 3 years ago
- Finding secrets in kernel and user memory☆116Sep 6, 2023Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Feb 16, 2025Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 2 weeks ago
- ☆100Sep 30, 2020Updated 5 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 4 years ago
- COM Hijacking VOODOO☆376Nov 27, 2025Updated 2 months ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- TeamsSix 的个人博客☆10Sep 6, 2025Updated 5 months ago
- ☆12Jun 22, 2022Updated 3 years ago