hoodoer / endgameLinks
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet π
β12Updated 4 years ago
Alternatives and similar repositories for endgame
Users that are interested in endgame are comparing it to the libraries listed below
Sorting:
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β40Updated 3 years ago
- Enumerate AWS permissions and resources.β71Updated 3 years ago
- Network penetration testing toolset wrapperβ81Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.comβ38Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β45Updated 3 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Teamβ17Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to β¦β126Updated last year
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.β13Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlareβ59Updated 3 years ago
- User enumeration and password spraying tool for testing Azure ADβ71Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β128Updated 3 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.β51Updated last week
- Tools and Scripts used in CRTPβ12Updated 5 years ago
- β24Updated 6 years ago
- β16Updated 4 years ago
- β34Updated 2 years ago
- β15Updated 4 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services β¦β50Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerabilityβ56Updated 3 years ago
- Google Meet Phishing Template For Gophishβ48Updated 3 years ago
- β55Updated 3 weeks ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.β20Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.β116Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIsβ21Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the examβ42Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environmentsβ89Updated last year
- Super organized and flexible script for sending phishing campaignsβ56Updated 4 years ago
- β90Updated 3 years ago
- β94Updated 3 years ago
- A python3 script searching for secret on swaggerhubβ66Updated 3 years ago