iknowjason / AriaCloudLinks
A Docker container for remote penetration testing.
☆141Updated 4 years ago
Alternatives and similar repositories for AriaCloud
Users that are interested in AriaCloud are comparing it to the libraries listed below
Sorting:
- ☆139Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆162Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 9 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Updated 3 months ago
- Active Directory Lab for Penetration Testing☆54Updated 6 months ago
- ☆69Updated 4 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆89Updated 7 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- ☆176Updated 2 years ago
- Resolves an IP address to the cloud provider it is hosted on☆101Updated last week
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Updated last week
- ATTPwn☆216Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- NessusV2 File Parser☆69Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Updated 3 years ago
- Statically Compiled Tools that could be used in engagements☆17Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆75Updated 2 weeks ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Updated 3 weeks ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- Find exposed data in Azure with this public blob scanner☆348Updated last year
- ☆23Updated 2 years ago