carlospolop / Bruteforce-GCP-PermissionsView external linksLinks
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆45Jun 22, 2025Updated 7 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- ☆14Jul 21, 2024Updated last year
- ☆18Aug 31, 2023Updated 2 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Dec 7, 2025Updated 2 months ago
- ☆96Jul 23, 2025Updated 6 months ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- ☆619Feb 5, 2026Updated last week
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 4 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- ☆12Updated this week
- ☆13Mar 27, 2021Updated 4 years ago
- ☆51Jun 13, 2024Updated last year
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆140Dec 31, 2025Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 9 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Nov 7, 2025Updated 3 months ago
- ☆13Mar 31, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ☆44Feb 6, 2025Updated last year
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- ☆21Sep 12, 2025Updated 5 months ago
- ☆19Dec 5, 2024Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Detect code obfuscation through text classification in the detection process.☆45Feb 7, 2024Updated 2 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 5 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- A modern postMessage tracker including additional features, inspired by Frans Rosens postmessage tracker. A port of chrome Manifest V3 "F…☆54Sep 12, 2025Updated 5 months ago
- ☆92Jun 21, 2024Updated last year
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago