AWS pwn Logo

AWS pwn

0
Free
Visit Website

This is a collection of horribly written scripts for performing various tasks related to penetration testing AWS. Please don't be sad if it doesn't work for you. It might be that AWS has changed since a given tool was written or it might be that the code sux. Either way, please feel free to contribute. Most of this junk was written by Daniel Grzelak but there's been plenty of contributions, most notably Mike Fuller. Requirements: pip install -r requirements.txt. Make sure to also set up your AWS credentials in ~/.aws/credentials.

FEATURES

ALTERNATIVES

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

Tool for attacking Active Directory environments through SQL Server access.

A tool for recursively querying webservers

Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

A practical guide on NTLM relaying for Active Directory attacks.