BishopFox / awsservicemap
Go module that returns supported regions for a service or supported services for a region
☆15Updated 8 months ago
Alternatives and similar repositories for awsservicemap:
Users that are interested in awsservicemap are comparing it to the libraries listed below
- Pythonize Intruder Payload☆13Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- ☆10Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- ☆14Updated last year
- ☆14Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- FireProx written in Go☆19Updated 10 months ago
- ☆17Updated last year
- Validate proxies for specific domain☆35Updated 3 years ago
- Inspired by gowitness and EyeWitness☆14Updated last month
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago