IamLucif3r / AWS-Key-Hunter
[Just for fun] Find exposed AWS keys (VALID KEYS ONLY) on github
☆37Updated 2 weeks ago
Alternatives and similar repositories for AWS-Key-Hunter
Users that are interested in AWS-Key-Hunter are comparing it to the libraries listed below
Sorting:
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆140Updated 4 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆102Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆107Updated 6 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆171Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆68Updated last week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last month
- An AWS IAM policy statement parser and query tool.☆179Updated last year
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆102Updated 2 weeks ago
- ☆73Updated last month
- ☆56Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- Security tool against dependency typosquatting attacks☆39Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 10 months ago
- ☆23Updated last month
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 6 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Scanner to identify dangling DNS records and subdomain takeovers☆42Updated 5 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Public repository of all things cloud security.☆41Updated 7 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 6 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆190Updated 7 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 7 months ago
- A project to visualize the software supply chain☆50Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆166Updated 6 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago