jeremylaratro / cloud_pentesting_overviewLinks
Cloud Pentesting Resource Collection
☆26Updated last year
Alternatives and similar repositories for cloud_pentesting_overview
Users that are interested in cloud_pentesting_overview are comparing it to the libraries listed below
Sorting:
- A not-curated list of cloud hacking labs☆25Updated last year
- ☆77Updated last year
- ☆21Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated last month
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆21Updated 11 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 4 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 10 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 6 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 2 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 11 months ago
- ☆13Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆30Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- ☆27Updated 2 years ago
- Challenge Python☆19Updated 2 years ago