☆99Jul 23, 2025Updated 8 months ago
Alternatives and similar repositories for bf-aws-permissions
Users that are interested in bf-aws-permissions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 21, 2024Updated last year
- ☆13Mar 31, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- ☆24Mar 20, 2023Updated 3 years ago
- ☆145Feb 26, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 9 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- ☆627Feb 5, 2026Updated last month
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 11 months ago
- ☆737Mar 19, 2026Updated last week
- A modern postMessage tracker including additional features, inspired by Frans Rosens postmessage tracker. A port of chrome Manifest V3 "F…☆56Sep 12, 2025Updated 6 months ago
- C2 Infrastructure Automation☆120Jun 21, 2025Updated 9 months ago
- ☆39Sep 25, 2023Updated 2 years ago
- Sample code for finding AWS Account ID of an S3 bucket.☆49Feb 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of offensive tools targeting Microsoft Azure☆220Jan 18, 2023Updated 3 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 3 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆416Oct 6, 2025Updated 5 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆348Mar 4, 2025Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆257May 7, 2020Updated 5 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Enumerate the permissions associated with AWS credential set☆1,231Feb 5, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆676Feb 17, 2026Updated last month
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆36Jun 21, 2024Updated last year
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆23Oct 28, 2024Updated last year
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- ☆56Nov 4, 2025Updated 4 months ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 4 years ago