carlospolop / aws-Perms2ManagedPolicies
☆11Updated 6 months ago
Alternatives and similar repositories for aws-Perms2ManagedPolicies:
Users that are interested in aws-Perms2ManagedPolicies are comparing it to the libraries listed below
- ☆17Updated last year
- SOAPI - The OpenAPI Documentation Scanner☆24Updated 2 weeks ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆16Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Automatically deploy Nemesis☆20Updated 7 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- ☆15Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆24Updated 4 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆25Updated 3 weeks ago
- Cobalt Strike BOFS☆16Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆16Updated 2 years ago
- A not-curated list of cloud hacking labs☆20Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆52Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 7 months ago
- A small red team course☆34Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆32Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆21Updated last year
- ☆13Updated 3 weeks ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆25Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆22Updated 9 months ago