pop3ret / AWSome-PentestingLinks
My cheatsheet notes to pentest AWS infrastructure
☆677Updated 2 years ago
Alternatives and similar repositories for AWSome-Pentesting
Users that are interested in AWSome-Pentesting are comparing it to the libraries listed below
Sorting:
- ☆728Updated 2 years ago
- Azure and AWS Attacks☆1,105Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆382Updated 2 months ago
- Awesome cloud enumerator☆1,018Updated 3 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆503Updated last year
- ☆569Updated 2 years ago
- ☆723Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,864Updated last month
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆939Updated this week
- Identify privilege escalation paths within and across different clouds☆698Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆420Updated 5 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆851Updated 7 months ago
- Websec interview questions by tib3rius answered☆309Updated last year
- ☆670Updated last week
- Golang client for querying SecurityTrails API data☆561Updated last year
- List of regex for scraping secret API keys and juicy information.☆706Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- Golden Guide☆487Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆395Updated 7 months ago
- ☆754Updated 11 months ago
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆841Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆870Updated last year
- Automating situational awareness for cloud penetration tests.☆2,130Updated 3 months ago
- ☆1,122Updated last year
- ☆841Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆336Updated 3 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆651Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,901Updated last year