Scan your account for the use of untrusted AMIs
☆31Feb 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for whoAMI-scanner
Users that are interested in whoAMI-scanner are comparing it to the libraries listed below
Sorting:
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆14Jan 8, 2026Updated last month
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.☆15May 28, 2025Updated 9 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- ☆46Nov 7, 2024Updated last year
- ☆65May 21, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ASUS wifi router RCE vulnerability☆18Oct 13, 2025Updated 4 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 6 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- ☆51Jun 13, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆287May 16, 2025Updated 9 months ago
- ☆142Nov 24, 2025Updated 3 months ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 9 months ago
- Secretly record audio and video with chromium based browsers.☆23Feb 14, 2024Updated 2 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- ☆25Jun 27, 2024Updated last year