nemo-wq / privilege_escalationLinks
Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM, common weaknesses in AWS deployments, specific to IAM, and how to exploit them manually. This was run as a workshop at BruCon 2019.
☆16Updated 5 years ago
Alternatives and similar repositories for privilege_escalation
Users that are interested in privilege_escalation are comparing it to the libraries listed below
Sorting:
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- ☆29Updated 8 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- ☆38Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 6 months ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- ☆36Updated 5 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆46Updated 6 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆32Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆33Updated 4 years ago
- Alphanumeric Encoder☆25Updated 6 years ago