A small library to alter AWS API requests; Used for fuzzing research
☆22Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for aws_api_shapeshifter
Users that are interested in aws_api_shapeshifter are comparing it to the libraries listed below
Sorting:
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- A demo repo for some unusual and user-unfriendly behaviour with AWS environment variable encryption☆11Oct 30, 2021Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 6 years ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Jan 5, 2026Updated 2 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- A self-hostable base for building and running custom agents that's heavily inspired by Claude Code on the web.☆29Updated this week
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Sep 19, 2022Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- What's Wrong - simple, quick first step when debugging any server issue☆52Jan 31, 2013Updated 13 years ago
- As simple interoperability app for FIDO2 servers [Please install me for interop]☆24May 20, 2025Updated 10 months ago
- ☆12Nov 3, 2020Updated 5 years ago
- Easy to use GuardDuty alerting with the help of Terraform and Slack☆19Apr 3, 2021Updated 4 years ago
- ☆12Dec 5, 2021Updated 4 years ago
- scrape the AWS service release notes and spit out a RSS feed☆15Jul 16, 2021Updated 4 years ago
- A simpler way to use Aurora Serverless Data API with Python.☆28Dec 8, 2022Updated 3 years ago
- Comprehensive integration skill for building sites with SvelteKit 2, Svelte 5, and Tailwind CSS v4☆23Oct 28, 2025Updated 4 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- DID based SIOP☆11Jan 1, 2023Updated 3 years ago
- A self-hosted AWS Lambda.☆16Feb 6, 2025Updated last year
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- ☆12Feb 18, 2022Updated 4 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Jun 18, 2019Updated 6 years ago
- Amplify 日本ユーザーグループのウェブサイト☆11Updated this week
- https://akaki.io☆12Jan 22, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- OPA Authzed experiments☆17Mar 11, 2024Updated 2 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- ☆11May 15, 2020Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago