GCP-IAM-Privilege-Escalation

Privilege Escalation Tools

A collection of GCP IAM privilege escalation methods and their associated tools

A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.

GitHub

343 stars
9 watching
74 forks
Language: Python
last commit: 7 months ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
rhinosecuritylabs/aws-iam-privilege-escalation A collection of research and documentation on methods for exploiting weaknesses in AWS IAM to gain unauthorized access 897
marcin-kolda/gcp-iam-collector A tool that collects and visualizes IAM permissions from Google Cloud Platform projects. 50
rhinosecuritylabs/security-research Exploits and security research written by a team of experts 1,059
carlospolop/purplepanda A tool that identifies privilege escalation paths in cloud and saas applications by analyzing permissions across multiple platforms. 668
ayoul3/privesc Tools for exploiting privilege escalation vulnerabilities on z/OS systems 79
rhinosecuritylabs/cloud-security-research Publishing research findings on cloud security vulnerabilities and exploitation techniques 355
rhinosecuritylabs/gcpbucketbrute Scripts to enumerate and analyze Google Storage bucket permissions 483
arthepsy/cve-2021-4034 A proof-of-concept demonstrating local privilege escalation in a specific vulnerability 1,056
andresriancho/enumerate-iam A tool to automatically enumerate permissions associated with AWS credentials 1,096
sagishahar/lpeworkshop A workshop providing a comprehensive guide to local privilege escalation on Linux and Windows operating systems. 1,879
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
nullarray/roothelper A collection of scripts for aiding in privilege escalation on Linux systems 485
sleventyeleven/linuxprivchecker A tool for identifying potential vulnerability points in Linux systems 1,569
ccob/sweetpotato Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. 1,622
atalii/adage A simple and secure alternative to sudo and doas for running commands with elevated privileges. 6