AWS SSO serverless phishing API.
☆32Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for awsssome_phish
Users that are interested in awsssome_phish are comparing it to the libraries listed below
Sorting:
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Sep 30, 2023Updated 2 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Convert JSON IAM Policies to other formats☆25Mar 2, 2026Updated last week
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- ☆12Dec 2, 2021Updated 4 years ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- ☆38Jun 9, 2021Updated 4 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Nov 12, 2024Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- ☆60May 25, 2023Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆114Jan 27, 2020Updated 6 years ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- ☆20Feb 22, 2021Updated 5 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Mar 6, 2025Updated last year
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago