iknowjason / AriaCloudLinks
A Docker container for remote penetration testing.
☆140Updated 4 years ago
Alternatives and similar repositories for AriaCloud
Users that are interested in AriaCloud are comparing it to the libraries listed below
Sorting:
- ☆139Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- ☆174Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated 3 weeks ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆174Updated last week
- Resolves an IP address to the cloud provider it is hosted on☆97Updated last week
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆137Updated 2 years ago
- ☆69Updated 3 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Active Directory Lab for Penetration Testing☆52Updated 2 months ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 5 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 6 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆82Updated this week
- ATTPwn☆215Updated last year
- Find exposed data in Azure with this public blob scanner☆340Updated last year
- NessusV2 File Parser☆65Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆157Updated 5 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆122Updated 2 months ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆171Updated 7 months ago