blackhatethicalhacking / pacuLinks
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
☆49Updated 5 years ago
Alternatives and similar repositories for pacu
Users that are interested in pacu are comparing it to the libraries listed below
Sorting:
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Updated 6 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 6 years ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆92Updated last year
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- ☆12Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- LinkedIn reconnaissance tool☆11Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- ☆28Updated 6 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆33Updated 7 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- The New Hacking Framework☆18Updated 8 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago