carlospolop / gcp_privesc_scriptsLinks
☆29Updated 2 years ago
Alternatives and similar repositories for gcp_privesc_scripts
Users that are interested in gcp_privesc_scripts are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- FireProx written in Go☆21Updated last year
- S3 bucket enumerator☆30Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆17Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 5 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- ☆13Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- ☆27Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- ☆38Updated last year
- Extract credentials from lsass remotely☆16Updated 5 years ago