wavestone-cdt / DEFCON-CICD-pipelines-workshopLinks
☆94Updated 2 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆82Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- ☆41Updated 2 years ago
- Silver SAML forgery tool☆54Updated last year
- Artifact monitoring that ensures fairplay☆77Updated 6 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 10 months ago
- Source Code Management Attack Toolkit☆132Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Tools and blogs I use to perform GCP red teams☆122Updated last year
- ☆114Updated 4 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 11 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 2 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 9 months ago
- ☆117Updated 4 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Talk slides and material☆33Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 3 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 4 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆39Updated last month
- a map for the azure oriented pentests☆66Updated 2 years ago
- ☆58Updated 2 years ago
- ☆64Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- https://lolad-project.github.io/☆80Updated 7 months ago
- ☆36Updated last week