cno-io / bh_awsView external linksLinks
Materials for AWS Training
☆15Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for bh_aws
Users that are interested in bh_aws are comparing it to the libraries listed below
Sorting:
- ☆12Oct 15, 2024Updated last year
- Azure Offensive Library☆17Oct 18, 2025Updated 3 months ago
- Automation framework for attack-defense CTFs.☆16Nov 22, 2019Updated 6 years ago
- ☆48Mar 19, 2020Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Cybersecurity Psychology Framework☆19Updated this week
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Jul 22, 2021Updated 4 years ago
- CVE-2020-5837 exploit☆43May 13, 2020Updated 5 years ago
- ☆11May 8, 2022Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆11Nov 24, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- 🥧 Generates classic British dishes☆13Dec 27, 2022Updated 3 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆15May 30, 2025Updated 8 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- RACF Database Parser☆11Apr 4, 2024Updated last year
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- ☆10Feb 25, 2021Updated 4 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago