carlospolop / Bruteforce-GCP-Permissions
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆29Updated 6 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions:
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆52Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- Discord C2 Profile for Mythic☆28Updated last month
- ysoserial.net docker image☆28Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆27Updated 2 years ago
- ☆11Updated 8 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆44Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- Custom queries list for BloodHound☆23Updated 6 months ago
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 2 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆45Updated last week
- Vulnerable Windows Application☆15Updated last year
- Webshell agent in aspx and php☆19Updated last week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆52Updated 4 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆15Updated 2 years ago
- Covert data exfiltration via DNS☆40Updated last month
- Exploits written while preparing for the OSED exam☆20Updated 10 months ago