wavestone-cdt / DEFCON-CICD-pipelines-workshop
☆93Updated 2 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆82Updated 2 years ago
- ☆40Updated 2 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆35Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- ☆117Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- ☆64Updated 2 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated last month
- Artifact monitoring that ensures fairplay☆75Updated 3 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 7 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆66Updated 4 months ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 11 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆79Updated 5 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- Tools and blogs I use to perform GCP red teams☆112Updated 9 months ago
- a map for the azure oriented pentests☆67Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated 10 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Updated last year
- https://lolad-project.github.io/☆75Updated 4 months ago