AWS SSO serverless phishing API.
☆32Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for awsssome_phish
Users that are interested in awsssome_phish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Sep 30, 2023Updated 2 years ago
- Fun tools around the EBS Direct API☆20Apr 16, 2021Updated 5 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Spawn Up quickly Elastic EDR Panel☆15Jan 29, 2022Updated 4 years ago
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆93Mar 17, 2025Updated last year
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Lightspin AWS IAM Vulnerability Scanner☆95Mar 28, 2021Updated 5 years ago
- Convert JSON IAM Policies to other formats☆26Apr 11, 2026Updated last week
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Jun 5, 2022Updated 3 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆285Nov 27, 2025Updated 4 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 11 months ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Manage AWS secrets using Slack slash commands☆14Jul 25, 2023Updated 2 years ago
- Spring 2017 CS 147 class at San Jose State☆13Sep 15, 2021Updated 4 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆26Aug 8, 2021Updated 4 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 7 months ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- macOS shellcode loader written in Objective-C☆48Jul 15, 2022Updated 3 years ago
- ☆21Feb 22, 2023Updated 3 years ago
- ☆60May 25, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- No need for IAM users when we have Yubikeys☆158Apr 7, 2022Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- ☆29Jan 31, 2025Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆68Feb 16, 2025Updated last year
- Like the unix tree command but for GCP Org Heirarchy☆27Apr 29, 2021Updated 4 years ago