carlospolop / aws-Perms2ManagedPoliciesView external linksLinks
☆14Jul 21, 2024Updated last year
Alternatives and similar repositories for aws-Perms2ManagedPolicies
Users that are interested in aws-Perms2ManagedPolicies are comparing it to the libraries listed below
Sorting:
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- ☆96Jul 23, 2025Updated 6 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- ☆13Mar 31, 2023Updated 2 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- ☆140Dec 31, 2025Updated last month
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Jun 12, 2025Updated 8 months ago
- Repository for my PowerShell scripts☆28Mar 12, 2024Updated last year
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆76Nov 18, 2022Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Sep 27, 2021Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- Algorithms Course Repo☆26Apr 23, 2025Updated 9 months ago
- ☆11Oct 14, 2020Updated 5 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆35Sep 26, 2023Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 10 months ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆11Nov 24, 2022Updated 3 years ago
- Starter kit of Nextjs includes tailwindcss configured in it.☆12Apr 3, 2022Updated 3 years ago
- Responsive accordion using next.js & tailwindcss for YT☆10Apr 10, 2022Updated 3 years ago
- Mouse and keyboard remote control for X11 systems implemented as a HTML5 web app for touchscreen devices.☆11May 23, 2023Updated 2 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Code Talk community is a place where you can learn to code from all aspects in computer science whether it is web development, mobile dev…☆15Dec 12, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- An Arabic fixed width font☆17Dec 3, 2025Updated 2 months ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago