bassammaged / awsEnumLinks
Enumerate AWS cloud resources based on provided credential
☆51Updated 3 years ago
Alternatives and similar repositories for awsEnum
Users that are interested in awsEnum are comparing it to the libraries listed below
Sorting:
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 3 years ago
- ☆27Updated 2 years ago
- ☆10Updated 3 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- Poc script for ProxyShell exploit chain in Exchange Server☆21Updated 3 years ago
- ☆25Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year