There are no reviews yet. Be the first to send feedback to the community and the maintainers!
CVE-2019-5736-PoC
PoC for CVE-2019-5736SneakyEndpoints
Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpointsaws_stealth_perm_enum
Research on the enumeration of IAM permissions without logging to CloudTrailCVE-2020-11108-PoC
PoCs for CVE-2020-11108; an RCE and priv esc in Pi-holeaws-api-models
A collection of documented and undocumented AWS API modelsaws_api_shapeshifter
A small library to alter AWS API requests; Used for fuzzing researchssm-agent-research
This is a custom SSM agent which is sorta functionaltools
A collection of pen-testing/hacking scripts. Various uses.gitlab-runner-research
Research on abusing GitLab RunnersSpecter
Specter is a prototype cryptocurrency developed to help people learn about Blockchain Technology.meltdown-spectre-poc
This is a combination of several different projects. It is intended to understand what the Meltdown and Spectre exploits are capable of.selfhosted-shodan-gather
Side project to catalog various selfhosted services on the internet using Shodan; Gather metrics on usage over timeenumate_iam_using_bucket_policy
Tool to enumerate IAM Users and Roles by Abusing S3 Bucket PoliciesLinux-From-Scratch
A repository holding everything I used to complete Linux From Scratch 8.2 (http://linuxfromscratch.org)sigv4-signing-examples
Original SIGv4 Signing Examplesdeserialization_stuff
Research on deserialization attacks in Python and PHPeasyPoll
A effective and simple polling tool for any environmentSPA-Directory-Enumerator
Tool to perform directory enumeration of single page web applicationsWiFiReader
Identifies nearby WiFi signalsaws_certified_solutions_architect_notes
Notes for AWS Certified Solutions Architect StudyingImage-Difference-Finder
A program to find the differences in "spot the differences" picturesGoEncryptTheCloud
Using Go, encrypt files and move them to the cloud (S3)aws-api-model-converter
Take undocumented APIs in the AWS Console and convert them to usable models for the AWS CLI.Cut-Out-C2
Covert command and control system for Red-Team OperationsappID-2-acctID
Resolve an AWS Amplify App ID to AWS Account IDBulldog-2-The-Reckoning
A vulnerable (on purpose) Node.js web application to teach about application security. A sequel to Bulldog.Tor-Docker-Proxy
Another Tor installation in a Docker container.Bulldog
The source code to a Vulnerable (on purpose) VMLove Open Source and this site? Check out how you can help us