jeremylaratro / cloud_pentesting_overview
Cloud Pentesting Resource Collection
☆21Updated last year
Alternatives and similar repositories for cloud_pentesting_overview:
Users that are interested in cloud_pentesting_overview are comparing it to the libraries listed below
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Resources for AD penetration testing and security☆30Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- ☆32Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆22Updated this week
- ☆19Updated last year
- Random scripts that I used in the CARTP course lab & final exam.☆10Updated last year
- ☆34Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated last week
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- ☆77Updated 11 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆46Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆48Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 3 weeks ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆23Updated 2 months ago
- Tools used for Pentesting☆22Updated last year
- ☆19Updated last year
- ☆11Updated 8 months ago