RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances of S3 Ransomwares using KMS
☆61Feb 5, 2025Updated last year
Alternatives and similar repositories for RansomWhen
Users that are interested in RansomWhen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆18Feb 2, 2026Updated last month
- ☆23Mar 4, 2025Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- ☆46Nov 7, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- ☆31Oct 28, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆129Jan 28, 2026Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- ☆30Jan 13, 2026Updated 2 months ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 4 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 6 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 3 months ago
- ☆11Dec 9, 2025Updated 3 months ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆79Feb 25, 2025Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- A very simple open source implementation of Google's Project Naptime☆182Mar 27, 2025Updated 11 months ago
- A repo to demonstrate a complete Terraform Demo☆13Jun 11, 2024Updated last year
- Bring runZero Exposure Management into BloodHound☆46Mar 14, 2026Updated last week
- MLOps Attack Toolkit☆31Aug 25, 2025Updated 6 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year