nccgroup / cowcloud
☆58Updated last year
Alternatives and similar repositories for cowcloud:
Users that are interested in cowcloud are comparing it to the libraries listed below
- Determine privileges from cloud credentials via brute-force testing.☆66Updated 6 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- ☆42Updated 8 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- ☆32Updated 7 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- AWS SSO serverless phishing API.☆31Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- ☆17Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- ☆33Updated 2 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆17Updated 4 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆34Updated 4 years ago
- ☆55Updated last year
- Virtual Security Operations Center☆50Updated last year
- Hijack a slack bot to phish your way in☆53Updated 2 months ago
- ☆15Updated 2 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆31Updated 3 months ago
- ☆30Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- ☆93Updated 2 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago