A small library to alter AWS API requests; Used for fuzzing research
☆22Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for aws_api_shapeshifter
Users that are interested in aws_api_shapeshifter are comparing it to the libraries listed below
Sorting:
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- A simpler way to use Aurora Serverless Data API with Python.☆28Dec 8, 2022Updated 3 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Jun 18, 2019Updated 6 years ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- High-performance open-source orchestration utility that utilizes EBS Direct APIs to efficiently clone, copy and migrate EBS snapshots to …☆39Dec 11, 2024Updated last year
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆69Feb 17, 2026Updated last week
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- A "passwordless" login experience for your AWS RDS☆38May 29, 2024Updated last year
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Feb 21, 2026Updated last week
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆36Dec 5, 2025Updated 2 months ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Jan 5, 2026Updated last month
- Fetch the details of assets hosted on AWS.☆88Dec 4, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A semi print-in-place hand for human-like manipulation, designed to be built by anyone.☆17Jan 5, 2026Updated last month
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Terraform provider for Salesforce☆10Jul 16, 2018Updated 7 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- Kubernetes on AWS Workshop☆10Nov 3, 2017Updated 8 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 10 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago