saw-your-packet / EC2StepShellLinks
EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.
☆66Updated 10 months ago
Alternatives and similar repositories for EC2StepShell
Users that are interested in EC2StepShell are comparing it to the libraries listed below
Sorting:
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 10 months ago
- Exploits Unauth Docker API☆41Updated 3 months ago
- ☆109Updated 8 months ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- Scripts that automate portions of pentests.☆52Updated 3 months ago
- Fast website scraper and wordlist generator☆81Updated 2 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated last month
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- POC for DLL Proxying / Hijacking☆61Updated 2 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- ☆27Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Tool to spray AWS Console IAM Logins☆30Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆73Updated last week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆52Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 7 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 11 months ago