lacioffi / GCP-pentest-lab
A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities
☆27Updated last month
Alternatives and similar repositories for GCP-pentest-lab:
Users that are interested in GCP-pentest-lab are comparing it to the libraries listed below
- A not-curated list of cloud hacking labs☆25Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆25Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆47Updated 10 months ago
- ☆35Updated last month
- ☆57Updated last year
- A web security research tool for DOM testing☆20Updated this week
- ☆12Updated last month
- ☆16Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆47Updated 2 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Learning a little bit of DevOps and using Infrastructure-as-a-Code tools to automate the creation of the AD lab in TCM Security's course.☆9Updated 2 years ago
- ☆77Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 8 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated 10 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆36Updated 3 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- Webshell agent in aspx and php☆20Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year