pumasecurity / serverless-prey
Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functions
☆236Updated last month
Alternatives and similar repositories for serverless-prey:
Users that are interested in serverless-prey are comparing it to the libraries listed below
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆210Updated 2 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆550Updated last month
- Resource types that can be publicly exposed on AWS☆320Updated 2 years ago
- Red Team Scripts for AWS.☆166Updated 4 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆487Updated 11 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Updated 4 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆96Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.