Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆45Jun 22, 2025Updated 8 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- ☆14Jul 21, 2024Updated last year
- ☆18Aug 31, 2023Updated 2 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- ☆98Jul 23, 2025Updated 7 months ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆51Jun 13, 2024Updated last year
- ☆142Feb 26, 2026Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆288May 16, 2025Updated 9 months ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 10 months ago
- ☆13Mar 31, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Mar 2, 2026Updated last week
- ☆44Feb 6, 2025Updated last year
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆35Feb 21, 2026Updated 2 weeks ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Detect code obfuscation through text classification in the detection process.☆46Feb 7, 2024Updated 2 years ago
- ☆19Dec 5, 2024Updated last year
- ☆20Feb 9, 2024Updated 2 years ago
- GCP cloud security CTF☆47Jun 25, 2025Updated 8 months ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- A modern postMessage tracker including additional features, inspired by Frans Rosens postmessage tracker. A port of chrome Manifest V3 "F…☆55Sep 12, 2025Updated 5 months ago
- ☆92Jun 21, 2024Updated last year
- ☆24Mar 20, 2023Updated 2 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated this week