Lemma – Harnessing AWS Lambda For Scalable Command-Line Tool Execution

The author of this project is not responsible for any damage or data loss incurred as a result of using this software. Use this software at your own risk. While efforts have been made to ensure the accuracy and reliability of the software, it is provided “as is” without warranty of any kind. By using …

Penetration Testing Tools – For Educational And Ethical Use

This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely for educational purposes and ethical penetration testing. By accessing, using, or contributing to this repository, you agree to the following terms: Tools And Resources

 AWS – Amazon Web Services

Elastic Kubernetes Service (EKS) is a managed kubernetes offering by AWS. Discover how to harness the power of Amazon Web Services (AWS) to deploy a robust, scalable Kubernetes environment. This tutorial guides you through setting up an EKS cluster, configuring essential tools like eksctl, kubectl, and awscli, and deploying the Kubernetes Goat for real-world application testing. …

Kubernetes – Standard Cluster

If you are already having a Kubernetes standard vanilla cluster environment and wanted to set up Kubernetes Goat, then you are in the right place. The below section contains the step-by-step instructions to set up the Kubernetes Goat in the standard cluster. Prerequisites​ Setup​

CloudBrute – Unleashing Automated Security Testing Across Multiple Cloud Platforms

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. Motivation we are always thinking of something we can automate to make black-box security testing easier. We discussed …

Volana – Mastering Stealth Command Execution During Penetration Testin

During pentest, an important aspect is to be stealth. For this reason you should clear your tracks after your passage. Nevertheless, many infrastructures log command and send them to a SIEM in a real time making the afterwards cleaning part alone useless. volana provide a simple way to hide commands executed on compromised machine by providing it self …

GCPwn – A Comprehensive Tool For GCP Security Testing

gcpwn was a tool built by myself while trying to learn GCP and leverages the newer GRPC client libraries created by google. It consists of numerous enumeration modules I wrote plus exploit modules leveraging research done by others in the space (ex. Rhino Security) along with some existing known standalone tools like GCPBucketBrute in an effort to make the …

Unbekannt Framework – The Comprehensive Hacking And Pentesting Suite For Windows

The Linux version is no longer supported! The last Linux version is 6.0 that you find inside this repository. The reason for this is that the Unbekannt Framework originally existed for Windows and Linux only supports a few features. Thats why I decided not to release new versions for Linux anymore. It is strongly recommended …

MNSAllTools – The Ultimate Collection Of 350+ Hacking Resources For Cybersecurity Professionals

A collection of 350+ hacking tools you can install into termux for hacking, Pentesting, Mapping and more. In this tool you will get a total of 350+ hacking tools for you to install into termux/kali/windows/ubuntu, Suitable for pentesters, bug hunting, exploitation, mapping, etc. You can install these tools by just typing the number it falls …

X-hackz : Your Gateway To Advanced Hacking Tools

“X-hackz” is a multifaceted toolkit designed for hacking enthusiasts and cybersecurity learners. It offers a range of functions from social media and camera hacking to WhatsApp viruses and SMS bombing. This guide provides detailed steps for installation and usage, emphasizing that X-hackz is intended solely for educational purposes. Discover how to harness these tools effectively …