sebastian-mora / awsssome_phishView external linksLinks
AWS SSO serverless phishing API.
☆32Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for awsssome_phish
Users that are interested in awsssome_phish are comparing it to the libraries listed below
Sorting:
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Sep 30, 2023Updated 2 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Convert JSON IAM Policies to other formats☆25Updated this week
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143May 1, 2025Updated 9 months ago
- Simulates a compromise in a cloud and container environment☆33Dec 18, 2024Updated last year
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 8 months ago
- ☆12Dec 2, 2021Updated 4 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- ☆37Jun 9, 2021Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Nov 12, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆112Jan 27, 2020Updated 6 years ago
- ☆21Feb 22, 2023Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- ☆60May 25, 2023Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 10 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Mar 6, 2025Updated 11 months ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 3 years ago
- Notification webhook for GoPhish☆58Jun 10, 2024Updated last year