stafordtituss / HazProne
HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabling you to pentest Vulnerabilities within, and hence, gain a better understanding of what could go wrong and why!!
☆39Updated 2 years ago
Alternatives and similar repositories for HazProne:
Users that are interested in HazProne are comparing it to the libraries listed below
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- ☆27Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 6 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- ☆24Updated 5 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆26Updated 5 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last month
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 3 weeks ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆35Updated 2 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- My talks...☆22Updated this week
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆48Updated last year
- ☆12Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆24Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated last month
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 3 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- Tools used for Pentesting☆22Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 5 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year