RhinoSecurityLabs / CloudScraperLinks
CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
☆32Updated 3 years ago
Alternatives and similar repositories for CloudScraper
Users that are interested in CloudScraper are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆51Updated 2 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆47Updated 4 years ago
- ☆138Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 3 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- ☆57Updated 2 years ago
- ☆60Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆24Updated 2 years ago
- ☆41Updated 6 months ago
- ☆18Updated 3 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆95Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 10 months ago
- ☆75Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 10 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆47Updated 4 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- Pull secrets from an AWS environment☆70Updated 5 years ago
- ☆37Updated last month
- ☆50Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- ☆112Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago