juanjoSanz / aws-pentesting-lab
Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet
☆188Updated 8 months ago
Alternatives and similar repositories for aws-pentesting-lab:
Users that are interested in aws-pentesting-lab are comparing it to the libraries listed below
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆52Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆115Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated 2 months ago
- ☆65Updated 3 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆121Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Short checklists for penetration testing methodology☆189Updated last year
- list of useful commands, shells and notes related to OSCP☆77Updated 7 years ago
- Script to manage and create local pentesting training virtual lab☆48Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- Awesome list for cloud security related projects☆116Updated 2 years ago
- ☆137Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆265Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆194Updated last year
- A set of recipes useful in pentesting and red teaming scenarios☆141Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- ☆131Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- Opening the door, one reverse shell at a time☆183Updated 3 years ago
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆144Updated last year
- Local penetration testing lab using docker-compose.☆192Updated last year
- ☆37Updated last year
- The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.☆56Updated 3 years ago
- Pwnspoof repository☆258Updated last year
- MayorSec DNS Enumeration Tool☆85Updated 3 months ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆250Updated 4 months ago
- Useful resources about phishing email analysis☆81Updated last month