carlospolop / bf-aws-perms-simulateLinks
☆19Updated last year
Alternatives and similar repositories for bf-aws-perms-simulate
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below
Sorting:
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 4 months ago
- ☆60Updated 2 years ago
- ☆19Updated 3 years ago
- Tool to spray AWS Console IAM Logins☆34Updated 3 years ago
- ☆24Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Updated last year
- ☆43Updated 3 years ago
- ☆15Updated 3 years ago
- ☆14Updated last year
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Updated 4 years ago
- A not-curated list of cloud hacking labs☆27Updated last year
- Ansible role that Installs Mythic☆18Updated last year