hupe1980 / awsreconView external linksLinks
Tool for reconnaissance of AWS cloud environments
☆16Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for awsrecon
Users that are interested in awsrecon are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆30Feb 2, 2026Updated last week
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ☆36May 27, 2024Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆21Jan 8, 2026Updated last month
- ☆19Mar 9, 2021Updated 4 years ago
- Subdomain Scan (knockpy) in Python3☆12Oct 4, 2020Updated 5 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- ☆37Jun 9, 2021Updated 4 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated 11 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- basic proxy as an azure function serverless app☆18Jan 12, 2023Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆21Jan 7, 2026Updated last month
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 4 months ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆20Nov 5, 2025Updated 3 months ago
- ☆19Sep 15, 2021Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago