carlospolop / Cloudtrail2IAMView external linksLinks
☆24Mar 20, 2023Updated 2 years ago
Alternatives and similar repositories for Cloudtrail2IAM
Users that are interested in Cloudtrail2IAM are comparing it to the libraries listed below
Sorting:
- ☆13Mar 31, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- ☆140Dec 31, 2025Updated last month
- ☆16Feb 10, 2025Updated last year
- ☆96Jul 23, 2025Updated 6 months ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- A curated checklist of tasks to be done during engagements☆34Aug 30, 2024Updated last year
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- An attempt to live code a working Retrieval Augmented Generation app with AI coding tools☆17Apr 24, 2025Updated 9 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 3 weeks ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 2 weeks ago
- ☆13Jun 10, 2024Updated last year
- ☆38Apr 7, 2023Updated 2 years ago
- Subdomain enumeration using Cloudflare's scanning tool.☆47Jul 11, 2025Updated 7 months ago
- ☆13Nov 5, 2024Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- ☆11Jan 3, 2023Updated 3 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆93Oct 24, 2020Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- ☆47Feb 11, 2023Updated 3 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated 2 weeks ago