The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testing. The tool is intended to speed up the process of Cloud review in case the security researcher compromised AWS Account Credentials.
☆245Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for aws-enumerator
Users that are interested in aws-enumerator are comparing it to the libraries listed below
Sorting:
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,080Feb 24, 2026Updated 2 weeks ago
- Enumerate the permissions associated with AWS credential set☆1,222Feb 5, 2024Updated 2 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,078Mar 19, 2024Updated last year
- S3 Account Search☆37Jul 25, 2025Updated 7 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,034Jul 12, 2025Updated 7 months ago
- ☆234Oct 8, 2024Updated last year
- Azure JWT Token Manipulation Toolset☆718Dec 6, 2024Updated last year
- ☆64Jan 2, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,303Updated this week
- ☆53Oct 20, 2020Updated 5 years ago
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,635Mar 4, 2025Updated last year
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,447Dec 18, 2022Updated 3 years ago
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆236Feb 15, 2021Updated 5 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆385Oct 27, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆571Updated this week
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- Kerberos protocol attacker☆139Feb 1, 2021Updated 5 years ago
- A tool to help query AD via the LDAP protocol☆610Sep 25, 2024Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Jul 30, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆257May 7, 2020Updated 5 years ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year