☆19Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for iaas_permission_mining
Users that are interested in iaas_permission_mining are comparing it to the libraries listed below
Sorting:
- ☆20Mar 1, 2026Updated last week
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Some handy bash scripts I used for the OSCP☆24Oct 1, 2022Updated 3 years ago
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 11 months ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- ☆11May 1, 2024Updated last year
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Aug 7, 2021Updated 4 years ago
- ☆40Aug 2, 2024Updated last year
- Sample code for finding AWS Account ID of an S3 bucket.☆49Feb 23, 2024Updated 2 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- ☆13Nov 5, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- ☆17Nov 30, 2025Updated 3 months ago
- ☆15Aug 5, 2025Updated 7 months ago
- ☆12Jun 17, 2024Updated last year
- ☆13Jun 10, 2024Updated last year
- ☆11May 30, 2021Updated 4 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 2 months ago
- ☆11May 28, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Nov 28, 2024Updated last year
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Let's Snatch The Admin Panel Of Any Website In Seconds.☆17Feb 24, 2020Updated 6 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- Configure and deploy AWS GuardDuty.☆11Sep 9, 2025Updated 6 months ago
- ☆14Jul 8, 2025Updated 8 months ago
- Lambda function that automatically create or update AWS resource with AWS service's IP ranges from the ip-ranges.json file. You can confi…☆17Jul 2, 2024Updated last year
- ☆13Oct 31, 2017Updated 8 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago