sebastian-mora / awsssome_phish
AWS SSO serverless phishing API.
☆32Updated 3 years ago
Alternatives and similar repositories for awsssome_phish:
Users that are interested in awsssome_phish are comparing it to the libraries listed below
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆57Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- ☆47Updated 10 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- ☆137Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- ☆33Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- A toolset to juggle AWS roles for persistent access☆56Updated 8 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- This is a custom SSM agent which is sorta functional☆17Updated 3 years ago
- Updated incident response generator for training classes☆44Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 5 months ago
- ☆35Updated 9 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13Updated 11 months ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- ☆126Updated 9 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 4 months ago
- ☆13Updated last year
- Collection of Slides From My Conference Talks☆20Updated 2 years ago