A toolset to juggle AWS roles for persistent access
☆64Aug 14, 2024Updated last year
Alternatives and similar repositories for AWSRoleJuggler
Users that are interested in AWSRoleJuggler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Sep 10, 2021Updated 4 years ago
- List of known AWS accounts☆257Apr 2, 2026Updated last month
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆261May 7, 2020Updated 6 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 5 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Jul 25, 2022Updated 3 years ago
- Payload designed for targeting Jamf enrolled devices.☆40May 19, 2023Updated 2 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- ☆127Jul 10, 2024Updated last year
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 5 years ago
- S3 Account Search☆43Jul 25, 2025Updated 9 months ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 4 months ago
- Firebase Domain Front Code☆21May 4, 2021Updated 5 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- Framework for inspecting and editing traffic in AWS VPCs☆113Mar 16, 2022Updated 4 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Demo app to illustrate how to write a Lambda function that self-adjusts its batch size to control throughput of Kinesis events☆19May 18, 2019Updated 6 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- Swift code to programmatically perform dylib injection☆53Oct 29, 2022Updated 3 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆163Apr 22, 2021Updated 5 years ago