Pr0teus / aws-trail-reconView external linksLinks
AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has
☆15May 14, 2024Updated last year
Alternatives and similar repositories for aws-trail-recon
Users that are interested in aws-trail-recon are comparing it to the libraries listed below
Sorting:
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Back, back, back in time... before there were fancy schmanzy web GUIs... along came SATAN.☆13Jul 10, 2015Updated 10 years ago
- Tool for testing reflections in the HTTP responses☆60Jun 10, 2023Updated 2 years ago
- Audio Transcription for WhatsApp☆16Jun 28, 2024Updated last year
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- Este repositorio é apenas um exemplo de como adicionar OWASP ZAP Actions em uma pipeline de DevOps.☆19Mar 12, 2021Updated 4 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bounty☆23Apr 7, 2025Updated 10 months ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- Brazilian OSINT Sources☆28Dec 19, 2023Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- DevSecOps Pipeline using SAST + DAST and SCA tools☆73Sep 26, 2025Updated 4 months ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆40Sep 25, 2025Updated 4 months ago
- Pentest tool for OSINT in social networks☆36Sep 10, 2015Updated 10 years ago
- List of all previous CNCF Project's Security Audit Reports☆38Jan 13, 2021Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Aug 28, 2023Updated 2 years ago
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- workshop about cloud-native security☆71Apr 14, 2022Updated 3 years ago
- ☆11Mar 25, 2024Updated last year
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆23Nov 12, 2025Updated 3 months ago
- ☆10May 12, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- ☆10Nov 29, 2025Updated 2 months ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆15Mar 3, 2023Updated 2 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Jan 9, 2026Updated last month