carlospolop / Bruteforce-GCP-Permissions
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆32Updated 3 weeks ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions:
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
- ☆27Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆45Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆52Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 7 months ago
- Scripts that automate portions of pentests.☆50Updated last week
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- ☆12Updated 10 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 3 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆44Updated last year
- ☆62Updated this week
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆28Updated 5 months ago
- ysoserial.net docker image☆28Updated 7 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- ☆12Updated 3 weeks ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- ☆38Updated 2 years ago
- ☆30Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago