carlospolop / bf-aws-permissionsView external linksLinks
☆96Jul 23, 2025Updated 6 months ago
Alternatives and similar repositories for bf-aws-permissions
Users that are interested in bf-aws-permissions are comparing it to the libraries listed below
Sorting:
- ☆14Jul 21, 2024Updated last year
- ☆13Mar 31, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- ☆24Mar 20, 2023Updated 2 years ago
- ☆140Dec 31, 2025Updated last month
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆727Updated this week
- ☆619Feb 5, 2026Updated last week
- ☆39Sep 25, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- Sample code for finding AWS Account ID of an S3 bucket.☆49Feb 23, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆217Jan 18, 2023Updated 3 years ago
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆412Oct 6, 2025Updated 4 months ago
- Notes some analysis related to VidarStealer sample☆17May 5, 2024Updated last year
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 10 months ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- All combinations of various characters, to get the desired word☆19Dec 13, 2023Updated 2 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆343Mar 4, 2025Updated 11 months ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 10 months ago
- Purple Team Strategies, Published by Packt☆14Jan 30, 2023Updated 3 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆30Feb 11, 2025Updated last year
- ☆29Oct 18, 2022Updated 3 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆164Jan 4, 2024Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- ☆35Dec 4, 2025Updated 2 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆674Jun 4, 2024Updated last year
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 2 months ago
- Enumerate the permissions associated with AWS credential set☆1,217Feb 5, 2024Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Lateral Movement☆125Nov 14, 2023Updated 2 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago