Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in …

Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in …
Motivation There are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major …
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of …
ATTPwn is a computer security tool designed to emulate adversaries. The tool aims to bring emulation of a real threat …
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this …