carlospolop / PurplePandaLinks
Identify privilege escalation paths within and across different clouds
☆711Updated last week
Alternatives and similar repositories for PurplePanda
Users that are interested in PurplePanda are comparing it to the libraries listed below
Sorting:
- ☆722Updated this week
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,281Updated 3 months ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆386Updated last year
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆392Updated 5 years ago
- ☆354Updated 4 years ago
- Awesome cloud enumerator☆1,085Updated 10 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,249Updated 10 months ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆964Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,457Updated last month
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆411Updated 3 months ago
- Pentester's Promiscuous Notebook☆526Updated 3 weeks ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆740Updated last month
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆242Updated 3 years ago
- A mostly-serverless distributed hash cracking platform☆643Updated last month
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,454Updated 9 months ago
- ☆439Updated last year
- ☆218Updated 5 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆706Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,275Updated last year
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆294Updated 4 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆343Updated 10 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,995Updated 6 months ago
- ☆750Updated 11 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆647Updated 5 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,259Updated this week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆671Updated last year
- Overlord - Red Teaming Infrastructure Automation☆626Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,309Updated 3 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,512Updated last month
- List of Stuff I did to get through the OSCP :D☆321Updated last month