carlospolop / Bruteforce-GCP-PermissionsLinks
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆41Updated 4 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆70Updated 3 weeks ago
- C2 Automation using Linode☆85Updated 3 years ago
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- Custom queries list for BloodHound☆31Updated 4 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto …☆42Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆35Updated 3 months ago
- ☆97Updated this week
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆40Updated last month
- Scripts that automate portions of pentests.☆54Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆99Updated 3 months ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆75Updated 6 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- ☆38Updated 3 years ago
- Rewriting SIET to python3☆53Updated last year
- Discord C2 Profile for Mythic☆33Updated 8 months ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated 11 months ago
- ☆54Updated 9 months ago
- ☆52Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated this week
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆102Updated 2 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago