PanosoikoGr / CloudTapLinks
Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Manager, and more — with multi-region scanning and auto-suggested privilege escalation paths.
☆42Updated 3 weeks ago
Alternatives and similar repositories for CloudTap
Users that are interested in CloudTap are comparing it to the libraries listed below
Sorting:
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆19Updated last month
- Azure Service Subdomain Enumeration☆64Updated 11 months ago
- Cloud subdomains identification tool☆60Updated 3 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 3 months ago
- ☆55Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆109Updated 2 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 2 months ago
- ☆65Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 8 months ago
- ☆28Updated 10 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Script related in Active Directory Attacks Domain☆22Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆25Updated 2 years ago
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- ☆76Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆43Updated 3 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated 2 years ago
- ☆32Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 7 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated 10 months ago
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 11 months ago