A tool to uncover undocumented APIs from the AWS Console.
☆121Mar 16, 2026Updated last month
Alternatives and similar repositories for undocumented-aws-api-hunter
Users that are interested in undocumented-aws-api-hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆40Aug 2, 2024Updated last year
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆23Mar 18, 2025Updated last year
- AWS honey token manager☆90Aug 1, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Jan 2, 2025Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- A collection of documented and undocumented AWS API models☆54Nov 21, 2025Updated 5 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- An AWS metadata enumeration tool by Plerion☆102Feb 12, 2024Updated 2 years ago
- Find what egress ports are allowed☆47Nov 19, 2025Updated 5 months ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆122Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆166Apr 10, 2024Updated 2 years ago
- ☆96Dec 25, 2025Updated 4 months ago
- Expand IAM Actions with Wildcards☆34Updated this week
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆22Updated this week
- Generate datasets of cloud audit logs for common attacks☆236Apr 23, 2026Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- List of known AWS accounts☆257Apr 2, 2026Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆202Jan 6, 2026Updated 3 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆703Dec 6, 2025Updated 4 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆155Nov 14, 2025Updated 5 months ago
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated last year
- The official website for The Discord Analytics for Risks & Threats Project.☆23Dec 29, 2025Updated 4 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆121Apr 17, 2026Updated 2 weeks ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Apr 20, 2026Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Apr 13, 2026Updated 2 weeks ago