A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities
☆34Nov 12, 2025Updated 5 months ago
Alternatives and similar repositories for GCP-pentest-lab
Users that are interested in GCP-pentest-lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Apr 29, 2026Updated last week
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 3 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆28Dec 9, 2024Updated last year
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated 2 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆16May 16, 2024Updated last year
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- ☆12Dec 21, 2021Updated 4 years ago
- OWASP ASVS Security Evaluation Templates with Nuclei☆42Dec 2, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- Another spinner written in bash. Customizable and pretty☆14Jul 3, 2019Updated 6 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- ☆47Nov 23, 2025Updated 5 months ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 3 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆24Aug 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 7 months ago
- The Primate Pack is a suite of extensions for Caido.☆14Sep 29, 2024Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆70Sep 25, 2023Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 10 months ago
- This is the word list for fuzzing kubernetes.☆15Nov 11, 2023Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Feb 17, 2021Updated 5 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆66Jun 4, 2025Updated 11 months ago
- Find your hash in online databases and retrieve its original value☆17Sep 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆20Feb 16, 2023Updated 3 years ago
- A curated list of Awesome Twitter Lists☆34Apr 26, 2023Updated 3 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆107Oct 19, 2024Updated last year
- LiteSpeed Cache Privilege Escalation PoC☆23Aug 25, 2024Updated last year
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago