Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community.
☆73Jun 21, 2024Updated last year
Alternatives and similar repositories for YetiHunter
Users that are interested in YetiHunter are comparing it to the libraries listed below
Sorting:
- ☆19Jan 31, 2025Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- ☆14Jan 8, 2026Updated last month
- ☆75Mar 19, 2025Updated 11 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Add a layer of active defense to your cloud applications.☆104Feb 11, 2026Updated 3 weeks ago
- ☆14Jul 9, 2024Updated last year
- ☆23Sep 20, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Updated this week
- ☆30Jan 13, 2026Updated last month
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆52Dec 13, 2025Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated last year
- ☆40Nov 29, 2024Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127May 28, 2024Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Feb 26, 2026Updated last week
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Dec 15, 2025Updated 2 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆235Jul 8, 2025Updated 7 months ago
- JavaScript for Automation (JXA) macOS agent☆92Feb 19, 2026Updated 2 weeks ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last week
- Linux CS bypass technique☆32Feb 4, 2025Updated last year