carlospolop / PurplePandaLinks
Identify privilege escalation paths within and across different clouds
☆699Updated 2 months ago
Alternatives and similar repositories for PurplePanda
Users that are interested in PurplePanda are comparing it to the libraries listed below
Sorting:
- ☆355Updated 4 years ago
- ☆686Updated this week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,182Updated 5 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,224Updated 2 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,417Updated 5 months ago
- Awesome cloud enumerator☆1,038Updated 5 months ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆383Updated 4 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆906Updated 9 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,373Updated 6 months ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆381Updated last year
- A mostly-serverless distributed hash cracking platform☆605Updated 2 weeks ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆703Updated 11 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,915Updated last month
- ☆432Updated last year
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆398Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,236Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆712Updated last month
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,223Updated last year
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,590Updated last week
- Pentester's Promiscuous Notebook☆501Updated 3 weeks ago
- List of Stuff I did to get through the OSCP :D☆286Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,411Updated 3 weeks ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆339Updated 5 months ago
- ☆214Updated 5 years ago
- Azure Security Resources and Notes☆1,597Updated last month
- Powershell tool to automate Active Directory enumeration.☆1,153Updated 2 months ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆534Updated 2 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆292Updated 3 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆629Updated 3 weeks ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,210Updated 3 weeks ago