carlospolop / gcp_privesc_scriptsView external linksLinks
☆30Mar 2, 2023Updated 2 years ago
Alternatives and similar repositories for gcp_privesc_scripts
Users that are interested in gcp_privesc_scripts are comparing it to the libraries listed below
Sorting:
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- ☆26Nov 25, 2025Updated 2 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- ☆79Jan 30, 2026Updated 2 weeks ago
- Windows privilege escalation with cmd☆90Dec 13, 2021Updated 4 years ago
- Seven different DLL injection techniques in one single project.☆13May 19, 2020Updated 5 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Nov 2, 2022Updated 3 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Nov 12, 2025Updated 3 months ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago
- ☆14Jul 21, 2024Updated last year
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- A small .NET compression utility☆57Feb 2, 2022Updated 4 years ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 7 months ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 7 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 10 months ago
- AWS IAM resources search tool☆21May 5, 2021Updated 4 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Tool of the buttons for quick search keywords ans hashtags in 70 different social media platforms☆46Sep 7, 2023Updated 2 years ago