carlospolop / bf-aws-perms-simulateLinks
☆20Updated last year
Alternatives and similar repositories for bf-aws-perms-simulate
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below
Sorting:
- ☆60Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 5 months ago
- ☆24Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆19Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- Tool to spray AWS Console IAM Logins☆34Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- ☆14Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 3 years ago
- Putting the C2 in C2loudflare☆18Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- A not-curated list of cloud hacking labs☆26Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- ☆15Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- Webshell agent in aspx and php☆28Updated last month
- Enumerate AWS permissions and resources.☆71Updated 3 years ago