PankajMoolrajani / PermCutter
Spec and Sample code for Identifying and Reducing Permission Explosion
☆11Updated last year
Related projects: ⓘ
- An AWS metadata enumeration tool by Plerion☆72Updated 7 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 3 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆57Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆56Updated last year
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆112Updated 11 months ago
- ☆33Updated 2 months ago
- WAF bypass PoC☆43Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆63Updated 3 weeks ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆38Updated 9 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆91Updated 9 months ago
- ☆58Updated last year
- boostsecurityio/lotp☆97Updated 5 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆127Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆42Updated 8 months ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆72Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆94Updated 2 years ago
- ☆39Updated 3 months ago
- ☆125Updated 2 months ago
- PoC for gaining persistency on vulnerable Lambdas☆30Updated 3 years ago
- AWS STS token decoder☆36Updated last month
- Blogpost series showcasing interesting cloud - web app security bugs☆44Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆56Updated 6 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆196Updated 2 months ago
- ☆108Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆68Updated 3 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆65Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆49Updated 6 months ago
- Cloud agnostic IAM permissions enumerator☆138Updated 3 weeks ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆48Updated 6 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago