A simple file-based scanner to look for potential AWS access and secret keys in files
☆94Mar 18, 2024Updated last year
Alternatives and similar repositories for cred_scanner
Users that are interested in cred_scanner are comparing it to the libraries listed below
Sorting:
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Sep 11, 2023Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆362Jun 24, 2020Updated 5 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆496Nov 10, 2022Updated 3 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- ☆11Jun 19, 2024Updated last year
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- Tool to search secrets in various filetypes.☆1,034Apr 25, 2023Updated 2 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆128Sep 2, 2019Updated 6 years ago
- A pattern for client/server communication via Named Pipes via C#☆97Aug 8, 2018Updated 7 years ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- WD My Cloud PoC exploit☆41May 22, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- Kerberoast attack -pure python-☆433Nov 30, 2023Updated 2 years ago
- Discover Printers☆169Sep 18, 2019Updated 6 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆907Dec 17, 2021Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago