offensive-terraform / terraform-aws-ec2-kali-linux
Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, ScoutSuite).
☆18Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for terraform-aws-ec2-kali-linux
- Virtual Security Operations Center☆49Updated last year
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆17Updated 4 years ago
- ☆58Updated last year
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- A tool for testing objects' permissions in AWS buckets☆39Updated 3 years ago
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆87Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆13Updated 4 years ago
- ☆31Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- ☆55Updated last year
- Monitoring GitHub for sensitive data shared publicly☆66Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆25Updated 4 months ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- ☆17Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- Holds the public Hacking the Cloud CTFs.☆49Updated 8 months ago