wavestone-cdt / DEFCON-CICD-pipelines-workshop
☆93Updated 2 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop:
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
- C2 Automation using Linode☆80Updated 2 years ago
- ☆33Updated 2 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- ☆40Updated 6 months ago
- ☆115Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Artifact monitoring that ensures fairplay☆75Updated last month
- Tools for attacking Azure Function Apps☆68Updated 4 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆147Updated last month
- https://lolad-project.github.io/☆71Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 5 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Generate graphs and charts based on password cracking result☆160Updated 2 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆89Updated 11 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 4 months ago
- Tools and blogs I use to perform GCP red teams☆106Updated 7 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- ☆54Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆119Updated 2 years ago
- A Red Team Activity Hub☆192Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated 8 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated 3 months ago
- ☆44Updated last month
- ☆53Updated last year
- ☆41Updated 2 years ago