stafordtituss / HazProneLinks
HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabling you to pentest Vulnerabilities within, and hence, gain a better understanding of what could go wrong and why!!
☆40Updated 3 years ago
Alternatives and similar repositories for HazProne
Users that are interested in HazProne are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- ☆90Updated 3 years ago
- Virtual Security Operations Center☆51Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- ☆23Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ☆18Updated 3 years ago
- ☆27Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- A not-curated list of cloud hacking labs☆25Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 months ago
- ☆94Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 3 months ago
- ☆26Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆24Updated 6 years ago
- Just another vulnerable web application.☆36Updated 11 months ago
- ☆21Updated 7 years ago