krol3 / demo-fileless
☆12Updated 5 months ago
Alternatives and similar repositories for demo-fileless:
Users that are interested in demo-fileless are comparing it to the libraries listed below
- ☆12Updated 4 years ago
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated last month
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- ☆17Updated last year
- Virtual Security Operations Center☆50Updated last year
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 9 months ago
- ☆28Updated 4 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆13Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- ☆56Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- ☆31Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 7 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆20Updated 2 years ago
- ☆12Updated last month
- ☆57Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 8 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 3 months ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago