barq
EC2 attack tool
An AWS-focused post-exploitation framework that enables attackers to compromise running EC2 instances without needing original credentials.
barq: The AWS Cloud Post Exploitation framework!
386 stars
19 watching
65 forks
Language: Python
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Automates deployment of AWS WAF security rules to protect against common web-based attacks | 863 |
| A Python-based toolkit for testing and exploiting AWS services | 787 |
| An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,204 |
| Real-time malware detection and alert system for AWS S3 files | 1,415 |
| A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| A curated list of open-source tools for assessing and improving AWS security posture | 9,007 |
| A tool to simplify the deployment and management of AWS Web Application Firewalls (WAFs) in cloud-based applications. | 237 |
| An attack tree model for identifying potential security vulnerabilities in an Azure DevOps Server supply chain. | 7 |
| A tool for simulating attacks on cloud environments such as Azure and AWS | 378 |
| A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 |
| A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. | 59 |
| Automatically patches vulnerable EC2 instances after receiving an Inspector assessment notification | 58 |
| A simple serverless application designed to create and monitor fake HTTP endpoints for security testing | 511 |
| An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| A low-level HTTP/2 library for exploiting race conditions in web servers | 153 |