christophetd / aws-sso-device-code-authentication
☆33Updated 3 years ago
Alternatives and similar repositories for aws-sso-device-code-authentication:
Users that are interested in aws-sso-device-code-authentication are comparing it to the libraries listed below
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆20Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆25Updated this week
- ☆47Updated 10 months ago
- Qemuno Framework☆24Updated 2 years ago
- ☆15Updated 2 years ago
- ☆46Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- ☆55Updated last year
- Tools for attacking Azure Function Apps☆71Updated 6 months ago
- Ansible role that Installs Mythic☆15Updated 10 months ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆13Updated 4 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆13Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 6 months ago
- blame Huy☆42Updated 4 years ago
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- ☆24Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- ☆13Updated last year
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- ☆18Updated 2 years ago
- ☆57Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year