hoodoer / endgameLinks
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet π
β12Updated 4 years ago
Alternatives and similar repositories for endgame
Users that are interested in endgame are comparing it to the libraries listed below
Sorting:
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β40Updated 3 years ago
- Enumerate AWS permissions and resources.β70Updated 3 years ago
- Network penetration testing toolset wrapperβ81Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.comβ39Updated 3 years ago
- User enumeration and password spraying tool for testing Azure ADβ69Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β45Updated 2 years ago
- β24Updated 6 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Teamβ17Updated last year
- β34Updated 2 years ago
- MayorSec DNS Enumeration Toolβ89Updated 11 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services β¦β50Updated 2 years ago
- Super organized and flexible script for sending phishing campaignsβ55Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β128Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLsβ32Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to β¦β125Updated last year
- β54Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.β60Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.β67Updated last year
- β90Updated 3 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.β13Updated 3 years ago
- β13Updated 3 years ago
- A python3 script searching for secret on swaggerhubβ66Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIsβ22Updated 3 years ago
- Google Meet Phishing Template For Gophishβ46Updated 3 years ago
- a map for the azure oriented pentestsβ67Updated 2 years ago
- β42Updated 3 years ago
- β16Updated 3 years ago
- Azure Service Subdomain Enumerationβ67Updated last year
- β40Updated last month
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commaβ¦β34Updated last year