carlospolop / bf-aws-perms-simulate
☆17Updated last year
Alternatives and similar repositories for bf-aws-perms-simulate:
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆2Updated 4 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- ☆11Updated 4 months ago
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support …☆11Updated last year
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- .NET wrapper around LogonUserA to test creds☆12Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆16Updated 2 years ago
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Ansible role that Installs Mythic☆15Updated 10 months ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last year
- ☆20Updated 2 years ago
- ☆17Updated 3 months ago
- ☆18Updated last year
- ☆15Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- FireProx written in Go☆19Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- ☆12Updated last year
- ☆14Updated last year