☆23Sep 20, 2024Updated last year
Alternatives and similar repositories for ice-axe
Users that are interested in ice-axe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- ☆54Oct 27, 2024Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Apr 29, 2026Updated last week
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Updated this week
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆102Feb 12, 2024Updated 2 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 11 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Apr 20, 2026Updated 2 weeks ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆124Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆71Oct 30, 2024Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated 2 years ago
- Generate datasets of cloud audit logs for common attacks☆237Apr 26, 2026Updated last week
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52May 2, 2026Updated last week
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- ☆25Jun 27, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆88May 13, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated last month