carlospolop / Bruteforce-GCP-Permissions
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆25Updated 5 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions:
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
- ☆52Updated last year
- ☆27Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 3 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 5 months ago
- Discord C2 Profile for Mythic☆26Updated this week
- Exploit for Symfony CVE-2024-50340 (forked eos)☆27Updated 2 months ago
- FireProx written in Go☆19Updated 10 months ago
- ☆16Updated 2 years ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆16Updated 11 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆44Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆54Updated 3 months ago
- ysoserial.net docker image☆28Updated 4 months ago
- ☆30Updated 2 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆21Updated 6 months ago
- Make better use of the embedded browser that comes by default with Burp☆42Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆22Updated 10 months ago
- Tools used for Pentesting☆22Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 8 months ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 11 months ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆25Updated last year
- shellcode obfuscater and runner in golang☆11Updated last year
- ☆11Updated 7 months ago