☆20Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for bf-aws-perms-simulate
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below
Sorting:
- ☆24Mar 20, 2023Updated 2 years ago
- ☆14Jul 21, 2024Updated last year
- ☆13Mar 31, 2023Updated 2 years ago
- ☆98Jul 23, 2025Updated 7 months ago
- ☆15May 26, 2021Updated 4 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- ☆142Feb 26, 2026Updated last week
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Sep 19, 2022Updated 3 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- ☆21Sep 23, 2025Updated 5 months ago
- ☆39Jul 29, 2021Updated 4 years ago
- ☆22Jan 2, 2026Updated 2 months ago
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 3 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last week
- ☆27Aug 8, 2021Updated 4 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Mar 11, 2019Updated 6 years ago
- ☆29May 12, 2025Updated 9 months ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- ☆79Aug 2, 2023Updated 2 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- ☆33Jun 12, 2024Updated last year
- Azure AD Identity Protection Cookie Spoofing☆36Sep 2, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- Algorithms Course Repo☆26Apr 23, 2025Updated 10 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- ☆69Jun 8, 2023Updated 2 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month