carlospolop / aws-Perms2ManagedPoliciesLinks
☆13Updated last year
Alternatives and similar repositories for aws-Perms2ManagedPolicies
Users that are interested in aws-Perms2ManagedPolicies are comparing it to the libraries listed below
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- ☆79Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 weeks ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 5 months ago
- ☆16Updated 3 months ago
- Simple Shellcode Runner in Rust Language☆18Updated last year
- ☆16Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 9 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆55Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- ☆35Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- IP address filter by City☆12Updated 10 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- ☆27Updated 2 years ago
- Tool for scanning domains for .git directories.☆16Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- A not-curated list of cloud hacking labs☆27Updated last year
- Cobalt Strike BOFS☆16Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- ☆27Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago