☆14Jul 21, 2024Updated last year
Alternatives and similar repositories for aws-Perms2ManagedPolicies
Users that are interested in aws-Perms2ManagedPolicies are comparing it to the libraries listed below
Sorting:
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- ☆98Jul 23, 2025Updated 7 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- ☆13Mar 31, 2023Updated 2 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- ☆142Feb 26, 2026Updated last week
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 8 months ago
- Repository for my PowerShell scripts☆28Mar 12, 2024Updated last year
- ☆29Mar 2, 2023Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Small project to facilitate creation of .lnk payloads☆80Nov 18, 2022Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆38Jul 12, 2023Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- Algorithms Course Repo☆26Apr 23, 2025Updated 10 months ago
- ☆11Oct 14, 2020Updated 5 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- Talk slides and material☆38Mar 24, 2024Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- movian repository☆12Jan 7, 2019Updated 7 years ago
- Responsive accordion using next.js & tailwindcss for YT☆10Apr 10, 2022Updated 3 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago