9rnt / poroView external linksLinks
Scan publicly accessible assets on your AWS cloud environment
☆136Jan 14, 2026Updated last month
Alternatives and similar repositories for poro
Users that are interested in poro are comparing it to the libraries listed below
Sorting:
- A simple debugging module for AWS Lambda (λ) timeout☆74Feb 11, 2019Updated 7 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Cheapest AWS VPC NAT.☆37May 11, 2021Updated 4 years ago
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated last month
- A command-line tool to get valuable information out of AWS CloudTrail☆830Updated this week
- ☆12Jun 22, 2022Updated 3 years ago
- AWS CloudSaga - Simulate security events in AWS☆472Updated this week
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- limit spend on AWS based on a tag, stop compute instances at threshold☆13Apr 13, 2020Updated 5 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆277Sep 20, 2024Updated last year
- ☆77Oct 16, 2022Updated 3 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,507Updated this week
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆511May 15, 2025Updated 9 months ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Convert a website to PDF using AWS lambda☆18May 3, 2022Updated 3 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- Red Team Scripts for AWS.☆169Jul 28, 2020Updated 5 years ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- Get alerts when people are using the AWS console to modify create or modify resources.☆90Mar 12, 2022Updated 3 years ago
- egrets monitors egress☆46Apr 12, 2020Updated 5 years ago
- Connect to any device with no external listening ports open☆282Feb 9, 2026Updated last week
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆590Nov 12, 2025Updated 3 months ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Updated this week
- ☆49Mar 21, 2023Updated 2 years ago