Macmod / STARSLinks
A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services that could possibly lead to subdomain takeover scenarios.
☆50Updated 2 years ago
Alternatives and similar repositories for STARS
Users that are interested in STARS are comparing it to the libraries listed below
Sorting:
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆90Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- ☆27Updated 2 years ago
- Fast website scraper and wordlist generator☆82Updated 9 months ago
- ☆24Updated 2 years ago
- ☆51Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- ☆55Updated last month
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Updated last month
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- ☆94Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated 2 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Manage attack surface data on Elasticsearch☆24Updated 2 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- FireProx written in Go☆21Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 3 months ago
- S3 bucket enumerator☆30Updated 6 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Updated 4 years ago