RhinoSecurityLabs / CloudScraperLinks
CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
☆32Updated 3 years ago
Alternatives and similar repositories for CloudScraper
Users that are interested in CloudScraper are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆51Updated last year
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- ☆137Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 months ago
- ☆56Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 11 months ago
- ☆58Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆24Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆34Updated 7 months ago
- GCP cloud security CTF☆46Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 9 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆41Updated 5 months ago
- ☆21Updated 2 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆11Updated 6 years ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- ☆31Updated 2 years ago
- 📚A curated list of product security resources.☆20Updated last month
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆95Updated last year
- ☆70Updated last year
- ☆34Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- ☆47Updated 3 months ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 8 months ago