☆20Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for bf-aws-perms-simulate
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 21, 2024Updated last year
- ☆24Mar 20, 2023Updated 3 years ago
- ☆13Mar 31, 2023Updated 3 years ago
- ☆30May 12, 2025Updated 11 months ago
- ☆39Jul 29, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ☆21Sep 23, 2025Updated 6 months ago
- ☆146Feb 26, 2026Updated last month
- ☆15May 26, 2021Updated 4 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Sep 19, 2022Updated 3 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- ☆26Aug 31, 2023Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 9 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆24Jan 2, 2026Updated 3 months ago
- Amazon EC2 Container Service Agent☆11Jan 16, 2025Updated last year
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- ☆127Jul 10, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆52Nov 12, 2024Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆118Mar 25, 2023Updated 3 years ago
- Azure AD Identity Protection Cookie Spoofing☆36Sep 2, 2023Updated 2 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆119Feb 7, 2024Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- ☆26Aug 8, 2021Updated 4 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Mar 19, 2026Updated 3 weeks ago
- ☆69Jun 8, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Another aws example is a public app to help you to start with serverless application☆13Oct 3, 2024Updated last year
- An SMTP server sidecar to allow AWS SES usage with IAM roles☆15Apr 7, 2026Updated last week
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆14Nov 9, 2022Updated 3 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago