A command line security audit tool for Amazon Web Services
☆82Mar 4, 2019Updated 6 years ago
Alternatives and similar repositories for cloud-security-audit
Users that are interested in cloud-security-audit are comparing it to the libraries listed below
Sorting:
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- Python library for examining, creating and optimising IAM policies☆22Aug 10, 2022Updated 3 years ago
- ☆25May 9, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Straight-forward HTTP client testing, assertions included!☆30Nov 20, 2025Updated 3 months ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Get teamviewer's ID and password from a remote computer in the LAN☆136Mar 6, 2020Updated 5 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- ☆16May 13, 2021Updated 4 years ago
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆659May 20, 2025Updated 9 months ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Unofficial api for cve.mitre.org☆40Aug 28, 2021Updated 4 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆271Aug 18, 2020Updated 5 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Proof of Concept framework for generating EC2 Image Builder pipelines☆10Feb 5, 2022Updated 4 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Apr 28, 2020Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago