christophetd / aws-sso-device-code-authenticationLinks
☆34Updated 4 years ago
Alternatives and similar repositories for aws-sso-device-code-authentication
Users that are interested in aws-sso-device-code-authentication are comparing it to the libraries listed below
Sorting:
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Tools for attacking Azure Function Apps☆83Updated 11 months ago
- ☆50Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- ☆60Updated 2 years ago
- ☆21Updated last month
- ☆73Updated 2 months ago
- Qemuno Framework☆24Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated 11 months ago
- ☆15Updated 3 years ago
- ☆59Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Silver SAML forgery tool☆56Updated last year
- ☆18Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated last week
- ☆46Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 2 months ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- A not-curated list of cloud hacking labs☆27Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆24Updated 2 weeks ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 2 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆98Updated last month
- ☆25Updated 3 years ago
- ☆35Updated this week
- blame Huy☆42Updated 4 years ago
- ☆10Updated last year
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago