🔴 Official Blog on R3d-Buck3t
- Abusing Compute Instance IAM Misconfigurations to Gain Privileges in GCP
- Stealing Cloud Function Access Tokens with Misconfigured IAM Policy [GCP]
- Payload Delivery with Azure Static Website and IPFS Dropper
- Configure Fireprox for IP Rotation using AWS API Gateway
- Adding Certificates to Postman & Burp Suite for API Testing
- Red Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 Redirectors
- Abusing Dynamic Groups in AzureAD [Part 1]
- Red Teaming in the Cloud: Installing Mythic C2 on Azure VM
- Red Teaming in the Cloud: Deploying Azure VMs for C2 Infrastructure
- Virtual Host Enumeration for Uncovering Hidden Subdomains
This repo is a collection of tools and commands for pentesting and red teaming assessments
- Web Application Security
- Window & Active Directory
- Cloud Security
- Netowrk Security
- Wireless Security
- Vulnerability Research
- Misc
- Resources
- Training
updating soon ....
![]() |
![]() |
![]() |
---|---|---|
Web Application Security | Network Pentesting | Active Directory |
![]() |
![]() |
![]() |
---|---|---|
Windows | Linux | Cloud Security |
![]() |
![]() |
![]() |
---|---|---|
Wireless | Vulnerability Research | Misc |