saw-your-packet / EC2StepShellLinks
EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.
☆68Updated last year
Alternatives and similar repositories for EC2StepShell
Users that are interested in EC2StepShell are comparing it to the libraries listed below
Sorting:
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- ☆27Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- Cloud Exploit Framework☆114Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆115Updated 2 years ago
- ☆76Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- FireProx written in Go☆21Updated last year
- Easy red team phishing with Puppeteer☆134Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 7 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ☆109Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Exploits Unauth Docker API☆43Updated 8 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated last month
- Scripts that automate portions of pentests.☆56Updated last week
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year