carlospolop / bf-aws-perms-simulateView external linksLinks
☆20Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for bf-aws-perms-simulate
Users that are interested in bf-aws-perms-simulate are comparing it to the libraries listed below
Sorting:
- ☆24Mar 20, 2023Updated 2 years ago
- ☆14Jul 21, 2024Updated last year
- ☆13Mar 31, 2023Updated 2 years ago
- ☆96Jul 23, 2025Updated 6 months ago
- ☆15May 26, 2021Updated 4 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- ☆140Dec 31, 2025Updated last month
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Sep 19, 2022Updated 3 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- ☆21Sep 23, 2025Updated 4 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆217Jan 18, 2023Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 3 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- ☆76Apr 8, 2024Updated last year
- ☆80Aug 2, 2023Updated 2 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- ☆33Jun 12, 2024Updated last year
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 4 months ago
- ☆25Jan 19, 2026Updated 3 weeks ago
- ☆68Jun 8, 2023Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Algorithms Course Repo☆26Apr 23, 2025Updated 9 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago