AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has
☆14May 14, 2024Updated last year
Alternatives and similar repositories for aws-trail-recon
Users that are interested in aws-trail-recon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 8 months ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Feb 11, 2023Updated 3 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Brazilian OSINT Sources☆28Dec 19, 2023Updated 2 years ago
- Back, back, back in time... before there were fancy schmanzy web GUIs... along came SATAN.☆13Jul 10, 2015Updated 10 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆16Jul 19, 2025Updated 9 months ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆26Sep 17, 2021Updated 4 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆47Aug 13, 2025Updated 8 months ago
- Tool for testing reflections in the HTTP responses☆60Jun 10, 2023Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- The Checkmarx One Visual Studio Code plugin (extension) enables you to import results from a Checkmarx One scan directly into your VS Cod…☆19Apr 27, 2026Updated last week
- ☆14May 6, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Jan 27, 2024Updated 2 years ago
- a brainfuck interpreter written in bash☆14Apr 22, 2016Updated 10 years ago
- ☆18Jun 25, 2024Updated last year
- Fake-Out : Fake-Out is an email spoofing tool created by HackEthics138, with security measures provided by Team Illusion. Thi…☆12Aug 19, 2024Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Essa repositório armazena uma versão em markdown do OWASP WSTG para ser utilizada como uma referência rápida durante testes de invasão em…☆16Aug 11, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Jun 15, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- self extracting tar archives☆22Jul 7, 2017Updated 8 years ago
- Cloud deployment size calculation utilities☆24Updated this week
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bounty☆24Apr 15, 2026Updated 3 weeks ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозит орий создан дл…☆12May 29, 2024Updated last year
- H2HC 2016 Slides/Materials/Presentations☆28Dec 21, 2016Updated 9 years ago
- workshop about cloud-native security☆70Apr 14, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆31Apr 20, 2026Updated 2 weeks ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year