carlospolop / bf-aws-perms-simulate
☆17Updated last year
Alternatives and similar repositories for bf-aws-perms-simulate
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below
Sorting:
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- ☆2Updated 4 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- ☆17Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 11 months ago
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 2 years ago
- Ansible role that Installs Mythic☆15Updated 10 months ago
- ☆18Updated last year
- ☆12Updated 9 months ago
- Webshell agent in aspx and php☆20Updated 2 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- ☆20Updated 2 years ago
- Docker container escape enumeration tool.☆10Updated 4 years ago
- ☆30Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- FireProx written in Go☆19Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆12Updated 2 years ago
- ☆57Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆27Updated 2 weeks ago