RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances of S3 Ransomwares using KMS
☆61Feb 5, 2025Updated last year
Alternatives and similar repositories for RansomWhen
Users that are interested in RansomWhen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Aug 13, 2025Updated 8 months ago
- ☆18Feb 2, 2026Updated 2 months ago
- ☆23Mar 4, 2025Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 9 months ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆46Nov 7, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 7 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- ☆31Oct 28, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆101Apr 7, 2026Updated last week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Updated this week
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆138Jan 28, 2026Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- ☆30Jan 13, 2026Updated 3 months ago
- C2 writen in Rust & Go powered by Tor network.☆155Oct 30, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 10 months ago
- ☆11Dec 9, 2025Updated 4 months ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆79Feb 25, 2025Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A very simple open source implementation of Google's Project Naptime☆185Mar 27, 2025Updated last year
- A repo to demonstrate a complete Terraform Demo☆13Jun 11, 2024Updated last year
- Bring runZero Exposure Management into BloodHound☆46Mar 14, 2026Updated last month
- MLOps Attack Toolkit☆31Aug 25, 2025Updated 7 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Java and Android mobile alerting and secure wipe application(s)☆24Oct 8, 2011Updated 14 years ago
- ☆16Dec 7, 2025Updated 4 months ago