wavestone-cdt / DEFCON-CICD-pipelines-workshopLinks
☆94Updated 3 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆85Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆42Updated 3 years ago
- ☆61Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 10 months ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Talk slides and material☆36Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- Source Code Management Attack Toolkit☆135Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆76Updated 7 months ago
- ☆84Updated last year
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Updated last year
- Tools and blogs I use to perform GCP red teams☆132Updated last year
- ☆33Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 3 years ago