hakaioffsec / gcp_enumLinks
A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.
☆18Updated 2 years ago
Alternatives and similar repositories for gcp_enum
Users that are interested in gcp_enum are comparing it to the libraries listed below
Sorting:
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- ☆60Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- ☆51Updated last year
- ☆19Updated 3 years ago
- ☆30Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated 2 months ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated last year
- ☆16Updated 2 years ago
- Docker container escape enumeration tool.☆12Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 6 months ago
- ☆13Updated last year
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- ☆15Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- ☆14Updated last year
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Updated 2 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆58Updated 5 years ago