offensive-terraform / terraform-aws-ec2-kali-linux
Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, ScoutSuite).
☆18Updated 4 years ago
Alternatives and similar repositories for terraform-aws-ec2-kali-linux:
Users that are interested in terraform-aws-ec2-kali-linux are comparing it to the libraries listed below
- Virtual Security Operations Center☆50Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- ☆58Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- ☆14Updated last year
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆17Updated 4 years ago
- ☆10Updated 6 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- ☆17Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- InfoSec OpenAI Examples☆19Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- ☆22Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Updated 3 weeks ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13Updated 10 months ago
- ☆11Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- ☆90Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago