jeffmcjunkin / endgame
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
☆10Updated 3 years ago
Alternatives and similar repositories for endgame:
Users that are interested in endgame are comparing it to the libraries listed below
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- ☆53Updated last year
- Library of sites for categorization☆26Updated 5 years ago
- ☆73Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- ☆41Updated 5 years ago
- ☆102Updated 3 months ago
- ☆55Updated 4 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆64Updated 3 years ago
- ☆15Updated 2 years ago
- List of Red Team Resources☆17Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆67Updated 7 months ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆77Updated 11 months ago
- ☆68Updated 3 years ago
- ☆47Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 6 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆85Updated 7 months ago
- ☆51Updated 5 months ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆112Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated this week
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆81Updated last month
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- ☆138Updated 5 years ago
- Post exploitation tool for configuration management servers.☆77Updated last year
- ☆76Updated 6 years ago