carlospolop / bf-aws-permissionsLinks
☆90Updated last month
Alternatives and similar repositories for bf-aws-permissions
Users that are interested in bf-aws-permissions are comparing it to the libraries listed below
Sorting:
- ☆79Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- ☆142Updated last year
- Azure mindmap for penetration tests☆188Updated last year
- Session Hijacking Visual Exploitation☆205Updated last year
- Everything and anything related to password spraying☆145Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆199Updated 10 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆378Updated 4 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- TUDO - A vulnerable PHP Web Application☆122Updated 2 years ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 9 months ago
- Sliver CheatSheet for OSEP☆117Updated 2 weeks ago
- ☆540Updated 2 weeks ago
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆49Updated 2 months ago
- A cheatsheet for NetExec☆138Updated 3 months ago
- A Red Team Activity Hub☆220Updated last month
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆96Updated last month
- Becoming the spider, crawling through the webs to catch the fly.☆78Updated 4 years ago
- winPEAS, but for Active Directory☆160Updated 5 months ago
- ☆171Updated 5 months ago
- Enumerate / Dump Docker Registry☆180Updated last year
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆39Updated 2 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Updated 8 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆108Updated 2 years ago
- ☆172Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆241Updated 6 months ago
- ☆55Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆208Updated 5 months ago