AWS IAM Username Enumerator and Password Spraying Tool in Python3
☆89Dec 7, 2025Updated 3 months ago
Alternatives and similar repositories for AWeSomeUserFinder
Users that are interested in AWeSomeUserFinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆289May 16, 2025Updated 10 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆21Feb 18, 2026Updated last month
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- ☆41Aug 25, 2024Updated last year
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆82Dec 29, 2025Updated 2 months ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- Remote command line LSASS extractor☆33Mar 4, 2026Updated 2 weeks ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆53Feb 4, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆65Feb 5, 2026Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- ☆108Nov 7, 2024Updated last year
- ☆625Feb 5, 2026Updated last month
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆227Mar 28, 2025Updated 11 months ago