This project was created as a proof of concept, combining serverless frameworks and techniques for persistence in an AWS account. Disclaimer: The term 'Hack' or 'Hacking' is used in the context of 'Ethical Hack' or 'Ethical Hacking' for educational purposes only. Do not misuse the information provided for unauthorized access or malicious purposes.
Common questions about MadKing Amazon Web Services Attack Platform including features, pricing, alternatives, and user reviews.
MadKing Amazon Web Services Attack Platform is A project for demonstrating AWS attack techniques with a focus on ethical hacking practices. It is a Security Operations solution designed to help security teams with Serverless, AWS, Persistence.
MadKing Amazon Web Services Attack Platform is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/ThreatResponse/mad-king/ for download and installation instructions.
Popular alternatives to MadKing Amazon Web Services Attack Platform include:
Compare all MadKing Amazon Web Services Attack Platform alternatives at https://cybersectools.com/alternatives/madking-amazon-web-services-attack-platform
MadKing Amazon Web Services Attack Platform is for security teams and organizations that need Serverless, AWS, Persistence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.
Documentation of an AWS IAM privilege escalation technique that exploits the iam:CreatePolicyVersion permission to gain elevated access through policy manipulation.
CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.
A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.