nccgroup / cowcloudLinks
☆60Updated 2 years ago
Alternatives and similar repositories for cowcloud
Users that are interested in cowcloud are comparing it to the libraries listed below
Sorting:
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- ☆51Updated last year
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- ☆20Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Updated 6 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆94Updated 3 years ago
- ☆55Updated 2 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Updated last month
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆15Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- ☆39Updated last year
- ☆114Updated 2 years ago
- Collection of Slides From My Conference Talks☆20Updated 3 years ago
- ☆37Updated 4 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Updated last year
- Scan your account for the use of untrusted AMIs☆31Updated 2 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 2 months ago
- ☆24Updated 2 years ago
- A not-curated list of cloud hacking labs☆26Updated last year