zer1t0 / awsenumLinks
Enumerate AWS permissions and resources.
☆71Updated 3 years ago
Alternatives and similar repositories for awsenum
Users that are interested in awsenum are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Fast website scraper and wordlist generator☆82Updated 7 months ago
- ☆27Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- ☆94Updated 3 years ago
- ☆54Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated last year
- ☆106Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated 3 weeks ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆115Updated 2 years ago
- Creates and sends fake meeting invite☆73Updated 4 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆42Updated 6 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- offensive notes & resources☆43Updated 8 months ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- ☆42Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago