carlospolop / Bruteforce-GCP-PermissionsLinks
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆45Updated 7 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- ☆39Updated 4 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- Scripts that automate portions of pentests.☆57Updated this week
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆114Updated 5 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- linikatz is a tool to attack AD on UNIX☆154Updated 2 years ago
- ☆55Updated 3 weeks ago
- Custom queries list for BloodHound☆31Updated 6 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- https://lolad-project.github.io/☆84Updated last year
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- ☆102Updated 2 months ago
- ☆73Updated last year
- ☆27Updated 2 years ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Easy red team phishing with Puppeteer☆133Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago