carlospolop / Bruteforce-GCP-PermissionsLinks
Use the GCP testIamPermissions functionality to bruteforce and discover your permissions
☆41Updated 4 months ago
Alternatives and similar repositories for Bruteforce-GCP-Permissions
Users that are interested in Bruteforce-GCP-Permissions are comparing it to the libraries listed below
Sorting:
- A tool for quickly evaluating IAM permissions in AWS.☆59Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆70Updated this week
- Scripts that automate portions of pentests.☆53Updated 2 months ago
- Custom queries list for BloodHound☆30Updated 3 months ago
- Discord C2 Profile for Mythic☆32Updated 8 months ago
- ☆39Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆51Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆35Updated 2 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 7 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- Rewriting SIET to python3☆53Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆16Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated last week
- ☆92Updated this week
- ☆55Updated last year
- ☆94Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago