• Stars
    star
    1,022
  • Rank 43,565 (Top 0.9 %)
  • Language
  • Created over 1 year ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Azure and AWS Attacks

Cloud Security - Attacks

AWS

Privilege Escalation to SYSTEM in AWS VPN Client

AWS WorkSpaces Remote Code Execution

Resource Injection in CloudFormation Templates

Downloading and Exploring AWS EBS Snapshots

CloudGoat ECS_EFS_Attack Walkthrough

GKE Kubelet TLS Bootstrap Privilege Escalation

Weaponizing AWS ECS Task Definitions to Steal Credentials From Running Containers

CloudGoat AWS Scenario Walkthrough: β€œEC2_SSRF”

Pillaging AWS ECS Task Definitions for Hardcoded Secrets

Abusing VPC Traffic Mirroring in AWS

Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT)

Bypassing IP Based Blocking with AWS API Gateway

Phishing Users with MFA on AWS

AWS IAM Privilege Escalation – Methods and Mitigation

Penetration Testing AWS Storage: Kicking the S3 Bucket

Cloud Security Risks (P2): CSV Injection in AWS CloudTrail

Amazon’s AWS Misconfiguration: Arbitrary Files Upload in Amazon Go

Privilege Escalation Attack : Attacking AWS IAM permission misconfigurations

IAM Vulnerable - An AWS IAM Privilege Escalation Playground

Escalator to the Cloud: 5 Privesc Attack Vectors in AWS

Vulnerable AWS Lambda function – Initial access in cloud attacks

Inside a Privilege Escalation Attack via Amazon Web Services’ EC2

AWS Attacks

AWS Shadow Admin

Gaining AWS Console Access via API Keys

Automate AWS AMI Creation For EC2 And Copy to Other Region

Instance Connect - Push an SSH key to EC2 instance

Golden SAML Attack

Stealing hashes from Domain Controllers in the Cloud

AWS PenTest Methodology

CloudGoat Official Walkthrough Series: β€œrce_web_app”

Azure

GKE Kubelet TLS Bootstrap Privilege Escalation

Cloud Security Risks (Part 1): Azure CSV Injection Vulnerability

Security for SaaS Companies: Leveraging Infosec for Business Value

Common Azure Security Vulnerabilities and Misconfigurations

Enumerate valid emails

Enumerate Azure Subdomains

Azure Attacks

Azure Active Directory Account Enumeration

Abusing Microsoft’s Azure domains to host phishing attacks

Defending against the EvilGinx2 MFA Bypass

Introduction To 365-Stealer - Understanding and Executing the Illicit Consent Grant Attack

Azure AD Password spray; from attack to detection (and prevention).

LATERAL MOVEMENT TO THE CLOUD WITH PASS-THE-PRT

Azure AD Pass The Certificate

How to SSH into specific Azure Web App instance

Attacking Azure, Azure AD, and Introducing PowerZure

Undetected Azure Active Directory Brute-Force Attacks

How Azure AD Could Be Vulnerable to Brute-Force and DOS Attacks

How to bypass MFA in Azure and O365

AWS Security Tools

Azure Security Tools

More Repositories

1

OSCE3-Complete-Guide

OSWE, OSEP, OSED, OSEE
2,336
star
2

Guide-CEH-Practical-Master

1,064
star
3

Awesome-Red-Team-Operations

1,039
star
4

Awesome-Cloud-PenTest

633
star
5

Red-Team-Management

HTML
522
star
6

Offensivesecurity-Checklists

Checklists for Testing Security environment
493
star
7

Awesome-Malware-and-Reverse-Engineering

343
star
8

eWPTX-Preparation

299
star
9

Python-for-Security

HTML
291
star
10

Awesome-Hardware-and-IoT-Hacking

208
star
11

GCP-Pentest-Checklist

195
star
12

OSCP-Survival-Guide

156
star
13

PNPT-Preparation-Guide

PNPT Exam Preparation - TCM Security
148
star
14

information-security-relatory

Reports from various areas of information security
134
star
15

eWPT-Preparation

132
star
16

awesome-flipperzero2

Compilation of contents about Flipper Zero
121
star
17

eCXD-Preparation

eLearnSecurity Certified Exploit Development
98
star
18

Awesome-Blue-Team-Operations

94
star
19

PenTest-Consulting-Creator

Repository with some necessary information for you to create your PenTest consultancy
92
star
20

Awesome-PenTest-Practice

Hackthebox, Vulnhub, TryHackMe and Real World PenTest
92
star
21

PenTest-Certifications-Roadmap

79
star
22

Buffer-Overflow-Labs

Practice Labs
76
star
23

Awesome-Exploit-Development

69
star
24

RedTeam-Scripts

PowerShell
69
star
25

OSCP-in-one-month

67
star
26

BadPDF-Generator

Python
62
star
27

Template-CherryTree-PenTest

57
star
28

Adversary-Emulation-Matrix

56
star
29

CyberSecurityUP

Hack
40
star
30

Web-PenTest-Checklist

40
star
31

Facial-Recognition-PenTest-Checklist

40
star
32

PenTest-Report-Collection

39
star
33

Windows-API-for-Red-Team

37
star
34

CyberSecurity-LinkedIn-Materials

34
star
35

Powershell-for-PenTest

27
star
36

Information-Security-Certifications-Map

26
star
37

AV-Bypass-codes

Python, C++ and Go
C++
20
star
38

Hackthebox-Privilege-Escalation

20
star
39

python-for-hackers

Python
19
star
40

Web-PenTest-Resume-Tips

19
star
41

Windows-Defender-DLL-Hijacking

C++
19
star
42

Osint-Social-Mapping

OSINT mapping using Twitter, Ficklr, Shodan and Insecam
Python
19
star
43

Fuxsociety

Fuxsociety Mr Robot 2.1
Python
18
star
44

Cybersecurity-Certifications-Guide

18
star
45

CRPYA

Challenge Python
Python
18
star
46

Bug-Bounty-Dorks-Vulns

16
star
47

Mitre-Attack-Matrix

16
star
48

Cracking-The-Perimeter-Framework

New Framework Red Team Operations
16
star
49

AWS-Cloud-Practicioner-Notes

15
star
50

Physical-PenTest-Methodology

Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152
15
star
51

shellcode-runner-rust

Simple Shellcode Runner in Rust Language
Rust
15
star
52

Cyber-Security-Contents

14
star
53

OSWP-Automated-tools

Shell
13
star
54

Python-Introduction

Python
13
star
55

Trevorfuscation

A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool
Shell
12
star
56

backup-fu

Automatic cloud backup of Kali Linux data
Shell
11
star
57

Harden-Fu

Shell
11
star
58

HunterX

King of Bug Bounty Tips Simple Tool
Shell
11
star
59

Adversary-Emulation-Guide

11
star
60

k8senumeration

Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments
Python
11
star
61

C2Matrix-Automation

C2Matrix Automation
Shell
10
star
62

ISO-27002-Document

10
star
63

PyDorkGPT

Google Hacking using Prompt ChatGPT
Python
9
star
64

Ransomware-Codes

Educational repository with source code examples
9
star
65

LiesGate

C++
9
star
66

TTPs-Mitre-Attack

8
star
67

study-TI

Auxilios nos seus estudos e planejamento
6
star
68

Challenges

Challenge Inmetrics
HTML
6
star
69

AWS-Cloud-Architect-Associate-Notes

6
star
70

stalkfacebook1.0

Python
6
star
71

Documentation-of-information-security

6
star
72

Application-Vulnerable

6
star
73

Simple-Ransomwares

C++
6
star
74

Standards-and-Controls

5
star
75

RansomwarePy

Ransomware Python
Python
5
star
76

facebookstalking2.0

Python
5
star
77

block-website

Bloqueador de website feito em python
Python
5
star
78

Suicide-Prevention-Map

Suicide Prevention Map using Google Place API and Google Search API
Python
5
star
79

ReconFu

Scripts made in python to automate recognition
Python
5
star
80

shellcode-templates

Assembly
4
star
81

JWTK-Exploits

Python
4
star
82

Snake-AI

Edition Code for Python the AI
Python
4
star
83

owasp-asvs-checklist-portugues

4
star
84

reversescripts

Scripts para Engenharia Reversa
Python
4
star
85

CRTO-Study

Zeropoint Course CRTO
HTML
4
star
86

SafeBuddy

APK Suicide Prevention
Java
4
star
87

Gerador-de-Certificados

Fork de um projeto de Gerador de Certificados, deixo todos os crΓ©ditos ao dono
Python
4
star
88

Powershell-Wallpaper-Change

PowerShell
3
star
89

SilverEye-Twitter-Scraping

A tool created to scrape twitter using its own API
Python
3
star
90

MSFAutoVenom

Shell
3
star
91

OWASP-MSTG-PORTUGUESE

3
star
92

Asuna

Python
3
star
93

search-speech-recognition-basic

Python
3
star
94

Introdu-o-ao-Python-2

Python
3
star
95

My-CVEs

3
star
96

jscollect2

Python
3
star
97

ASUNA-basic

Python
3
star
98

JavaScript-Codigo-e-HTML

Course JavaScript
JavaScript
2
star
99

C2Automated

Python
2
star
100

First-Script-Meterpreter

Ruby
2
star