wavestone-cdt / DEFCON-CICD-pipelines-workshopLinks
☆94Updated 2 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated 11 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆42Updated 3 years ago
- ☆42Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 3 months ago
- Silver SAML forgery tool☆55Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆60Updated 10 months ago
- ☆59Updated 2 years ago
- Posts about different topics☆40Updated last month
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- ☆60Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- https://lolad-project.github.io/☆81Updated 8 months ago