wavestone-cdt / DEFCON-CICD-pipelines-workshopLinks
☆94Updated 2 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
Sorting:
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Silver SAML forgery tool☆56Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- ☆114Updated 4 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆93Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated 11 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆72Updated 3 years ago
- ☆59Updated 2 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆42Updated 3 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 4 months ago
- Ransomware Simulator for testing Blue Team Detections☆38Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 5 months ago
- Talk slides and material☆33Updated last year
- ☆42Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated 11 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆33Updated 2 years ago
- ☆117Updated 4 years ago
- A not-curated list of cloud hacking labs☆27Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year