MadKing Amazon Web Services Attack Platform Description
This project was created as a proof of concept, combining serverless frameworks and techniques for persistence in an AWS account. Disclaimer: The term 'Hack' or 'Hacking' is used in the context of 'Ethical Hack' or 'Ethical Hacking' for educational purposes only. Do not misuse the information provided for unauthorized access or malicious purposes.
MadKing Amazon Web Services Attack Platform FAQ
Common questions about MadKing Amazon Web Services Attack Platform including features, pricing, alternatives, and user reviews.
MadKing Amazon Web Services Attack Platform is A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.. It is a Security Operations solution designed to help security teams with Serverless, AWS, Persistence.
ALTERNATIVES
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.
Documentation of an AWS IAM privilege escalation technique that exploits the iam:CreatePolicyVersion permission to gain elevated access through policy manipulation.
CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.
A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox
