Scan your account for the use of untrusted AMIs
β32Mar 16, 2026Updated last week
Alternatives and similar repositories for whoAMI-scanner
Users that are interested in whoAMI-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.β15Aug 12, 2021Updated 4 years ago
- π»ββοΈ πΉ Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.β14May 22, 2024Updated last year
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradleyβ19Jul 26, 2025Updated 7 months ago
- An Evil OIDC Serverβ53Oct 19, 2022Updated 3 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Serviceβ41Feb 9, 2026Updated last month
- conformity-template-scanner-pipelineβ13Mar 15, 2024Updated 2 years ago
- Host Internal Static Website on AWSβ17Dec 6, 2023Updated 2 years ago
- Inlining functions in IDA HexRays using microcode. Abandoned due to official outline support in IDA v8.0β16Feb 19, 2023Updated 3 years ago
- β42Nov 13, 2025Updated 4 months ago
- Helm chart for Trend Micro Cloud One Container Securityβ20Oct 28, 2025Updated 4 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securitβ¦β37Oct 17, 2024Updated last year
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.β23Updated this week
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote rootβ21Oct 20, 2022Updated 3 years ago
- Tool for obfuscating and deobfuscating data.β77Mar 20, 2024Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API'sβ92Mar 17, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidentsβ146Jun 18, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β101Jan 12, 2024Updated 2 years ago
- β13Dec 27, 2019Updated 6 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findingβ¦β50Jul 4, 2025Updated 8 months ago
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.β15May 28, 2025Updated 9 months ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insnsβ20Nov 2, 2024Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Aug 29, 2024Updated last year
- An interactive way to learn threat modelingβ17Feb 14, 2019Updated 7 years ago
- Nuclei plugins to audit Chrome extensionsβ65Jul 16, 2024Updated last year
- basic proxy as an azure function serverless appβ17Jan 12, 2023Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"β15Apr 10, 2025Updated 11 months ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.β23Apr 22, 2021Updated 4 years ago
- A recon tool for GCP Service Account Keys that requires no permissionsβ27Apr 14, 2025Updated 11 months ago
- Tools for Attacking Pleasant Password Serverβ23Sep 19, 2023Updated 2 years ago
- β46Nov 7, 2024Updated last year
- cloudgrep is grep for cloud storageβ326Mar 14, 2026Updated last week
- β24May 31, 2024Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Toolβ103Jan 27, 2026Updated last month
- Google Maps for AWS IAMβ271Updated this week
- AWS honey token managerβ90Aug 1, 2024Updated last year
- β14Jan 8, 2026Updated 2 months ago
- β20Sep 6, 2023Updated 2 years ago
- Repository with supporting materials for Invictus Academy/Trainingβ44Jan 3, 2025Updated last year
- β18Jul 30, 2024Updated last year