GCP-IAM-Privilege-Escalation
Privilege Escalation Tools
A collection of GCP IAM privilege escalation methods and their associated tools
A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.
351 stars
9 watching
74 forks
Language: Python
last commit: 11 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of research and documentation on methods for exploiting weaknesses in AWS IAM to gain unauthorized access | 901 |
| A tool that collects and visualizes IAM permissions from Google Cloud Platform projects. | 50 |
| Exploits and security research written by a team of experts | 1,064 |
| A tool that identifies privilege escalation paths in cloud and saas applications by analyzing permissions across multiple platforms. | 673 |
| Tools for exploiting privilege escalation vulnerabilities on z/OS systems | 79 |
| Publishing research findings on cloud security vulnerabilities and exploitation techniques | 358 |
| Scripts to enumerate and analyze Google Storage bucket permissions | 494 |
| A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,060 |
| A tool to automatically enumerate permissions associated with AWS credentials | 1,105 |
| A workshop providing a comprehensive guide to local privilege escalation on Linux and Windows operating systems. | 1,893 |
| Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |
| A collection of scripts for aiding in privilege escalation on Linux systems | 485 |
| A tool for identifying potential vulnerability points in Linux systems | 1,590 |
| Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. | 1,638 |
| A simple and secure alternative to sudo and doas for running commands with elevated privileges. | 6 |