☆136Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for AWS-Security-Tools
Users that are interested in AWS-Security-Tools are comparing it to the libraries listed below
Sorting:
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- ☆41Jan 19, 2023Updated 3 years ago
- A carefully curated list of open source projects aimed at improving your AWS security posture!☆31Feb 22, 2022Updated 4 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- ☆72Sep 18, 2020Updated 5 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆18Aug 24, 2025Updated 6 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆596Mar 10, 2026Updated last week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,414Oct 16, 2025Updated 5 months ago
- ☆15Jun 27, 2020Updated 5 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- Caching layer for botocore / boto3 SDK.☆12Mar 13, 2024Updated 2 years ago
- A simple Node.js WiFi Scanner.☆16Sep 15, 2015Updated 10 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 11 months ago
- ☆16Feb 12, 2022Updated 4 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- All you need about Active Directory☆16Jul 22, 2021Updated 4 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Convert XCCDF files from DISA STIG and OpenSCAP Content into Comma Separated Values files making it easier to convert into potential Open…☆16Jul 11, 2017Updated 8 years ago
- Sample Flutter application for Android☆10Jun 8, 2019Updated 6 years ago
- Main repository to pull all Cisco related projects.☆16Sep 21, 2017Updated 8 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- A Tool for Domain Flyovers - my version of michenriksen's aquatone☆10May 1, 2023Updated 2 years ago
- Secure Azure IoT solutions end to end☆14Nov 28, 2022Updated 3 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆553Mar 12, 2026Updated last week
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- An extendable and flexible infrastructure for program instrumentation.☆25Feb 19, 2026Updated last month
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 6 months ago
- This example shows how you can create a Lambda function to retrieve inventory information to create the integrated inventory spreadsheet …☆28Sep 20, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆24May 19, 2025Updated 10 months ago
- FIPS 140-2-compliant Golang images based on Alpine.☆16Jul 16, 2021Updated 4 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,097Updated this week
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- A simple, LFI vulnerable PHP application☆18Sep 27, 2018Updated 7 years ago