zer1t0 / awsenumLinks
Enumerate AWS permissions and resources.
☆70Updated 3 years ago
Alternatives and similar repositories for awsenum
Users that are interested in awsenum are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆27Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Fast website scraper and wordlist generator☆81Updated 6 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆24Updated 6 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- ☆94Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆75Updated 6 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆96Updated last year
- ☆54Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago
- ☆90Updated 3 years ago
- offensive notes & resources☆43Updated 7 months ago