carlospolop / Blue-CloudPEASSLinks
☆41Updated this week
Alternatives and similar repositories for Blue-CloudPEASS
Users that are interested in Blue-CloudPEASS are comparing it to the libraries listed below
Sorting:
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆50Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆42Updated 6 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆136Updated last month
- ☆54Updated 2 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated 2 weeks ago
- Cloud subdomains identification tool☆62Updated 8 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- ☆94Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆47Updated 5 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Tools and blogs I use to perform GCP red teams☆134Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆36Updated 4 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated 2 years ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 6 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Updated 6 months ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- Collection of offensive tools targeting Microsoft Azure☆215Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago