nemo-wq / privilege_escalationLinks
Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM, common weaknesses in AWS deployments, specific to IAM, and how to exploit them manually. This was run as a workshop at BruCon 2019.
☆16Updated 5 years ago
Alternatives and similar repositories for privilege_escalation
Users that are interested in privilege_escalation are comparing it to the libraries listed below
Sorting:
- Pivot into private VPC networks using a VPN connection☆43Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- ☆38Updated 5 years ago
- ☆29Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- ☆18Updated 8 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- ☆93Updated 2 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- ☆24Updated 10 months ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 4 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Yet another open S3 bucket finder☆20Updated 7 years ago
- ☆36Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Burp Extension for AWS Signing☆89Updated 9 months ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆47Updated 6 years ago