carlospolop / Bruteforce-GCP-Permissions
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆24Updated 4 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions:
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
- ☆27Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆52Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 8 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated last month
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆12Updated 4 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆11Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆43Updated last year
- Make better use of the embedded browser that comes by default with Burp☆41Updated last year
- ysoserial.net docker image☆28Updated 3 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Cobalt Strike BOFS☆16Updated last year
- ☆11Updated 5 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆25Updated 11 months ago
- Tools used for Pentesting☆22Updated last year
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Tool to spray AWS Console IAM Logins☆26Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆24Updated 2 years ago
- SOAPI - The OpenAPI Documentation Scanner☆24Updated this week
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆48Updated 10 months ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆33Updated 3 months ago