wavestone-cdt / DEFCON-CICD-pipelines-workshopLinks
☆94Updated 3 years ago
Alternatives and similar repositories for DEFCON-CICD-pipelines-workshop
Users that are interested in DEFCON-CICD-pipelines-workshop are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆42Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated 3 weeks ago
- ☆41Updated this week
- ☆119Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆41Updated 4 months ago
- Silver SAML forgery tool☆56Updated last year
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Tools and blogs I use to perform GCP red teams☆134Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Talk slides and material☆37Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆60Updated 2 years ago
- Posts about different topics☆40Updated 4 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 6 months ago
- All kinds of tiny shells☆65Updated 2 years ago
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- ☆62Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- https://lolad-project.github.io/☆84Updated 11 months ago
- ☆65Updated 4 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago