Did you contain the compromised identity? notyet
☆40May 4, 2026Updated this week
Alternatives and similar repositories for notyet
Users that are interested in notyet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆22Apr 29, 2026Updated last week
- ☆14Mar 6, 2023Updated 3 years ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆46Dec 7, 2025Updated 4 months ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- An AWS IAM Privilege Escalation Path Library☆129Apr 27, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- This command prepares your project directory for "Mynewproject" in the showcase directory and "mynewproject" in the boxes directory, incl…☆17Dec 15, 2024Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rails engine that includes the logic to create surveys/questionnaires in your apps.☆48Feb 6, 2015Updated 11 years ago
- Google Maps for AWS IAM☆272Apr 29, 2026Updated last week
- Offensive Web is a documentation website about web security research, bypass and new exploitation techniques.☆34Feb 14, 2026Updated 2 months ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy☆23Nov 23, 2024Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 9 months ago
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for quickly evaluating IAM permissions in AWS.☆77May 27, 2024Updated last year
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- A tool to identify and investigate inauthentic GitHub user accounts and repositories.☆85Apr 23, 2026Updated last week
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated last year
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Apr 29, 2026Updated last week
- ☆43Nov 13, 2025Updated 5 months ago
- ☆43Aug 27, 2025Updated 8 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆132Apr 23, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 31, 2026Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆50Updated this week
- Official urlscan.io and urlscan Pro CLI tool☆35Apr 1, 2026Updated last month
- Kafka library with a schema registry integration☆10Dec 16, 2025Updated 4 months ago
- Content Security Policy Creation tools☆35Aug 3, 2015Updated 10 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated last month
- A Burp Suite extension for analyzing Next.js Server Actions - server-side functions identified by hash IDs and `Next-Action` headers.☆54Aug 8, 2025Updated 8 months ago