BishopFox / smogcloudLinks
Find cloud assets that no one wants exposed π βοΈ
β347Updated 4 years ago
Alternatives and similar repositories for smogcloud
Users that are interested in smogcloud are comparing it to the libraries listed below
Sorting:
- Search exposed EBS volumes for secretsβ297Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β134Updated 5 years ago
- FestIn - Open S3 Bucket Scannerβ234Updated 4 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.β251Updated 2 months ago
- β252Updated last year
- A tool to hunt for credentials in github wild AKA git*huntβ295Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.β388Updated 5 years ago
- These are the regexes that power truffleHogβ217Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.β526Updated 2 years ago
- Benchmarking repo for secrets scanningβ234Updated 10 months ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover supportβ296Updated 2 months ago
- A tool for identifying misconfigured CloudFront domainsβ360Updated 5 years ago
- Yar is a tool for plunderin' organizations, users and/or repositories.β238Updated 4 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaβ¦β172Updated 6 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.β178Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 3 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloβ¦β126Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiβ209Updated 8 months ago
- A checklist of practices for organizations dealing with account takeover (ATO)β269Updated 9 months ago
- Pentesting/Bugbounty Dockerfiles.β177Updated 4 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Namesβ353Updated last year
- barq: The AWS Cloud Post Exploitation framework!β387Updated 2 years ago
- Finding exposed secrets and personal data in GitLabβ199Updated 7 months ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β633Updated 5 years ago
- Uncover forgotten secrets and bring them back to life, haunting security and operations teams.β207Updated 2 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modulesβ188Updated 3 years ago
- A Docker container for remote penetration testing.β135Updated 4 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server forβ¦β192Updated 4 years ago
- A highly configurable Framework for easy automated web scanningβ376Updated 5 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).β122Updated 2 years ago