When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud
☆46Dec 7, 2025Updated 5 months ago
Alternatives and similar repositories for SkyEye
Users that are interested in SkyEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Did you contain the compromised identity? notyet☆40Updated this week
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- An AWS IAM Privilege Escalation Path Library☆129Apr 27, 2026Updated last week
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Apr 29, 2026Updated last week
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆46Nov 7, 2024Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 10 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 10 months ago
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- Working reverse-engineered Claude Code CLI rebuilt from source analysis to reproduce the original terminal workflow☆106Apr 18, 2026Updated 3 weeks ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆14May 12, 2025Updated 11 months ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- ☆13Apr 9, 2025Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy☆23Nov 23, 2024Updated last year
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated 2 months ago
- Super fast duplicate file finder written in Golang.☆44Updated this week
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 3 months ago
- Blow off steam by destroying your editor with bullets, hammers, and flamethrowers. A fun break during frustrating coding sessions!☆12Mar 14, 2025Updated last year
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- A minimalistic approach to interact with RabbitMQ☆10Mar 3, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆42Nov 3, 2025Updated 6 months ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 6 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Apr 27, 2026Updated last week
- Official urlscan.io and urlscan Pro CLI tool☆35Apr 1, 2026Updated last month