MadKing Amazon Web Services Attack Platform Logo

MadKing Amazon Web Services Attack Platform

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

Visit Website
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

MadKing Amazon Web Services Attack Platform Description

This project was created as a proof of concept, combining serverless frameworks and techniques for persistence in an AWS account. Disclaimer: The term 'Hack' or 'Hacking' is used in the context of 'Ethical Hack' or 'Ethical Hacking' for educational purposes only. Do not misuse the information provided for unauthorized access or malicious purposes.

MadKing Amazon Web Services Attack Platform FAQ

Common questions about MadKing Amazon Web Services Attack Platform including features, pricing, alternatives, and user reviews.

MadKing Amazon Web Services Attack Platform is A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.. It is a Security Operations solution designed to help security teams with Serverless, AWS, Persistence.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

AzureC2Relay Logo

An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.

0
PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0
AWS IAM Privilege Escalation Methods Logo

Documentation of an AWS IAM privilege escalation technique that exploits the iam:CreatePolicyVersion permission to gain elevated access through policy manipulation.

0
CloudCopy Logo

CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.

0
barq Logo

A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox