☆261Jun 28, 2024Updated last year
Alternatives and similar repositories for cloud-service-enum
Users that are interested in cloud-service-enum are comparing it to the libraries listed below
Sorting:
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Pivot into private VPC networks using a VPN connection☆43Oct 8, 2019Updated 6 years ago
- Enumerate the permissions associated with AWS credential set☆1,222Feb 5, 2024Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- S3 Account Search☆36Jul 25, 2025Updated 7 months ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,027Jul 12, 2025Updated 7 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Updated this week
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆256May 7, 2020Updated 5 years ago
- AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation☆2,216Apr 3, 2023Updated 2 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Mar 1, 2019Updated 7 years ago
- ☆707Nov 27, 2024Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆555May 26, 2023Updated 2 years ago
- ☆408Feb 10, 2026Updated 2 weeks ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆605Nov 28, 2024Updated last year
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆496Nov 10, 2022Updated 3 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- ☆31Apr 6, 2021Updated 4 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- project-blacklist3r☆637Oct 3, 2025Updated 4 months ago
- DNS rebinding toolkit☆253May 22, 2023Updated 2 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,306Oct 29, 2025Updated 4 months ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,528Feb 5, 2026Updated 3 weeks ago
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- ☆37Jun 9, 2021Updated 4 years ago
- Multi-Cloud Security Auditing Tool☆7,551Sep 23, 2025Updated 5 months ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- ☆148Feb 17, 2022Updated 4 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago