carlospolop / Bruteforce-GCP-PermissionsLinks
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆43Updated 6 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 2 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆41Updated 2 weeks ago
- C2 Automation using Linode☆85Updated 3 years ago
- Custom queries list for BloodHound☆31Updated 6 months ago
- ☆102Updated last month
- Scripts that automate portions of pentests.☆56Updated last week
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated 2 weeks ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆115Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆149Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- ☆54Updated this week
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆39Updated 4 years ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆103Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆110Updated 4 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Webshell agent in aspx and php☆28Updated last month
- Easy red team phishing with Puppeteer☆134Updated 2 years ago