☆142Feb 26, 2026Updated last week
Alternatives and similar repositories for Blue-CloudPEASS
Users that are interested in Blue-CloudPEASS are comparing it to the libraries listed below
Sorting:
- ☆13Mar 31, 2023Updated 2 years ago
- ☆24Mar 20, 2023Updated 2 years ago
- ☆14Jul 21, 2024Updated last year
- ☆98Jul 23, 2025Updated 7 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 6 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- ☆12Jun 17, 2024Updated last year
- GCP cloud security CTF☆47Jun 25, 2025Updated 8 months ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated last week
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆44Jan 22, 2025Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- Remote C2-style MCP server for Frida instrumentation on rooted Android☆32Jan 31, 2026Updated last month
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆19Apr 14, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated 2 weeks ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 2 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆415Oct 6, 2025Updated 5 months ago
- MDE/MDI Defender setup for Ludus☆38Updated this week
- ☆22Apr 11, 2025Updated 10 months ago
- ☆16Dec 16, 2021Updated 4 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆16Aug 15, 2023Updated 2 years ago
- blame Huy☆42Jan 3, 2021Updated 5 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Aug 4, 2024Updated last year
- From Patch to PoC☆30Nov 19, 2025Updated 3 months ago
- A modern postMessage tracker including additional features, inspired by Frans Rosens postmessage tracker. A port of chrome Manifest V3 "F…☆55Sep 12, 2025Updated 5 months ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated 2 weeks ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Nov 26, 2020Updated 5 years ago
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 10 months ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆152Feb 2, 2026Updated last month
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Kerberos CNAME abuse PoC☆79Jan 27, 2026Updated last month
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago