carlospolop / Bruteforce-GCP-PermissionsLinks
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆37Updated 3 weeks ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- ☆52Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 10 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 7 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Discord C2 Profile for Mythic☆30Updated 4 months ago
- ☆72Updated this week
- ☆27Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 4 months ago
- Scripts that automate portions of pentests.☆51Updated 2 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆46Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 8 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- ☆13Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 7 months ago
- Custom queries list for BloodHound☆29Updated this week
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 4 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- POC for DLL Proxying / Hijacking☆61Updated last month
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year