peass-ng / Blue-CloudPEASSView external linksLinks
☆140Dec 31, 2025Updated last month
Alternatives and similar repositories for Blue-CloudPEASS
Users that are interested in Blue-CloudPEASS are comparing it to the libraries listed below
Sorting:
- ☆24Mar 20, 2023Updated 2 years ago
- ☆14Jul 21, 2024Updated last year
- ☆96Jul 23, 2025Updated 6 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 6 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- ☆12Jun 17, 2024Updated last year
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆42Jan 22, 2025Updated last year
- Remote C2-style MCP server for Frida instrumentation on rooted Android☆30Jan 31, 2026Updated 2 weeks ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆256May 7, 2020Updated 5 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆20Apr 14, 2023Updated 2 years ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆674Jun 4, 2024Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated last month
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆412Oct 6, 2025Updated 4 months ago
- From Patch to PoC☆28Nov 19, 2025Updated 2 months ago
- ☆16Dec 16, 2021Updated 4 years ago
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- ☆22Apr 11, 2025Updated 10 months ago
- blame Huy☆42Jan 3, 2021Updated 5 years ago
- Active Directory Auditing and Enumeration☆515Dec 3, 2025Updated 2 months ago
- Port Crawler Pythonized☆19Dec 8, 2022Updated 3 years ago
- A modern postMessage tracker including additional features, inspired by Frans Rosens postmessage tracker. A port of chrome Manifest V3 "F…☆54Sep 12, 2025Updated 5 months ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 2 years ago
- A TUI for Active Directory collection.☆67Feb 3, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆19Nov 13, 2025Updated 3 months ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Nov 26, 2020Updated 5 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Aug 4, 2024Updated last year
- ☆619Feb 5, 2026Updated last week
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 9 months ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago