lacioffi / GCP-pentest-labView external linksLinks
A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities
☆32Nov 12, 2025Updated 3 months ago
Alternatives and similar repositories for GCP-pentest-lab
Users that are interested in GCP-pentest-lab are comparing it to the libraries listed below
Sorting:
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Updated this week
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- ☆12Dec 21, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- ☆12Oct 2, 2022Updated 3 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- Another spinner written in bash. Customizable and pretty☆14Jul 3, 2019Updated 6 years ago
- Saves pages to Wayback machine☆13Dec 2, 2024Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆40May 5, 2024Updated last year
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆13Jun 28, 2021Updated 4 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 10 months ago
- Scan DockerHub images that match a keyword to find secrets.☆60Feb 17, 2021Updated 4 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 4 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆20Jan 13, 2025Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Feb 8, 2024Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- A simple utility to generate domain names with all possible TLDs☆24Feb 3, 2023Updated 3 years ago
- A collection of one off hacks and simple scripts☆27Mar 21, 2023Updated 2 years ago
- SMB password sprayer☆21Jan 19, 2019Updated 7 years ago
- Static analysis of wordpress plugins☆60Dec 16, 2020Updated 5 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Jun 12, 2023Updated 2 years ago
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆107Oct 19, 2024Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Sep 25, 2023Updated 2 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆64Jun 4, 2025Updated 8 months ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆28May 8, 2018Updated 7 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70May 20, 2025Updated 8 months ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆27Oct 21, 2020Updated 5 years ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- ☆28Apr 22, 2025Updated 9 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated last month
- Mass querying whois records☆29Dec 28, 2021Updated 4 years ago