YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection
☆102Jan 6, 2026Updated last month
Alternatives and similar repositories for yes3-scanner
Users that are interested in yes3-scanner are comparing it to the libraries listed below
Sorting:
- ☆18Feb 2, 2026Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆64Aug 17, 2025Updated 6 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆120Dec 9, 2025Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆76May 27, 2024Updated last year
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- ☆43Aug 27, 2025Updated 6 months ago
- ☆49Apr 9, 2025Updated 10 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆45Dec 19, 2025Updated 2 months ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 4 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- An AWS IAM Privilege Escalation Path Library☆119Feb 23, 2026Updated last week
- ☆37Apr 9, 2025Updated 10 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆19Jun 17, 2024Updated last year
- An open source tool to generate AWS infrastructure diagrams from AWS CloudFormation templates☆27Updated this week
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- ☆32Feb 23, 2026Updated last week
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago