Scan publicly accessible assets on your AWS cloud environment
☆136Jan 14, 2026Updated 2 months ago
Alternatives and similar repositories for poro
Users that are interested in poro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple debugging module for AWS Lambda (λ) timeout☆74Feb 11, 2019Updated 7 years ago
- Cheapest AWS VPC NAT.☆37May 11, 2021Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 10 months ago
- AWS CloudSaga - Simulate security events in AWS☆474Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆831Mar 23, 2026Updated last week
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- find dangling domains in a multi cloud environment☆176Dec 25, 2025Updated 3 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Sep 20, 2024Updated last year
- Connect to any device with no external listening ports open☆280Updated this week
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- AWS VPC Subnets Watcher☆80Aug 23, 2023Updated 2 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- ☆49Mar 21, 2023Updated 3 years ago
- Convert a website to PDF using AWS lambda☆18May 3, 2022Updated 3 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆114Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CloudWatch Log Redirector☆15Feb 3, 2026Updated last month
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- AWS Lambda function to tag EBS volumes created by autoscaling☆18Mar 7, 2018Updated 8 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Red Team Scripts for AWS.☆169Jul 28, 2020Updated 5 years ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,036Feb 9, 2026Updated last month
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- ☆77Oct 16, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated 2 weeks ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- AWS IAM linting library☆1,112Jan 7, 2026Updated 2 months ago
- ☆114Jun 8, 2023Updated 2 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143May 3, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago