Scan your account for the use of untrusted AMIs
β32Apr 26, 2026Updated this week
Alternatives and similar repositories for whoAMI-scanner
Users that are interested in whoAMI-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.β15Aug 12, 2021Updated 4 years ago
- π»ββοΈ πΉ Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.β14May 22, 2024Updated last year
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradleyβ20Jul 26, 2025Updated 9 months ago
- An Evil OIDC Serverβ53Oct 19, 2022Updated 3 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Serviceβ41Feb 9, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Host Internal Static Website on AWSβ17Dec 6, 2023Updated 2 years ago
- β43Nov 13, 2025Updated 5 months ago
- This project provides and example of how you can use the combination of AWS Systems Manager Session Manager and Amazon EC2 Instance Conneβ¦β50Jun 14, 2023Updated 2 years ago
- Helm chart for Trend Micro Cloud One Container Securityβ20Oct 28, 2025Updated 6 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securitβ¦β37Oct 17, 2024Updated last year
- Python implementation of select MicroBurst scripts.β17Aug 19, 2021Updated 4 years ago
- Tool for obfuscating and deobfuscating data.β77Mar 20, 2024Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API'sβ93Mar 17, 2025Updated last year
- Secure cursor rules following the R.A.I.L.G.U.A.R.D Frameworkβ13Apr 21, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote rootβ22Oct 20, 2022Updated 3 years ago
- Cloud Commotion intends to cause chaos to simulate security incidentsβ148Jun 18, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β101Jan 12, 2024Updated 2 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findingβ¦β50Jul 4, 2025Updated 9 months ago
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.β16Apr 17, 2026Updated 2 weeks ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queriβ¦β20Mar 13, 2025Updated last year
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insnsβ20Nov 2, 2024Updated last year
- An interactive way to learn threat modelingβ17Feb 14, 2019Updated 7 years ago
- ASUS wifi router RCE vulnerabilityβ19Oct 13, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- basic proxy as an azure function serverless appβ17Jan 12, 2023Updated 3 years ago
- Nuclei plugins to audit Chrome extensionsβ65Jul 16, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"β16Apr 10, 2025Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.β23Apr 22, 2021Updated 5 years ago
- Java archive implant toolkit.β61Apr 20, 2025Updated last year
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 issβ¦β83Jun 11, 2025Updated 10 months ago
- β65May 21, 2024Updated last year
- A recon tool for GCP Service Account Keys that requires no permissionsβ27Apr 14, 2025Updated last year
- Tools for Attacking Pleasant Password Serverβ23Sep 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- β46Nov 7, 2024Updated last year
- β24May 31, 2024Updated last year
- cloudgrep is grep for cloud storageβ329Mar 14, 2026Updated last month
- Cloud Offensive Breach and Risk Assessment (COBRA) Toolβ104Apr 15, 2026Updated 2 weeks ago
- AWS honey token managerβ90Aug 1, 2024Updated last year
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)β20Jun 6, 2025Updated 10 months ago
- Google Maps for AWS IAMβ272Updated this week