RhinoSecurityLabs / CloudScraper
CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
☆31Updated 3 years ago
Alternatives and similar repositories for CloudScraper:
Users that are interested in CloudScraper are comparing it to the libraries listed below
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆56Updated 2 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆11Updated 5 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- ☆137Updated 2 years ago
- ☆35Updated last month
- ☆20Updated 2 years ago
- ☆41Updated 2 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- ☆18Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆29Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆47Updated 3 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- 📚A curated list of product security resources.☆19Updated 2 years ago
- ☆57Updated last year
- ☆33Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- A not-curated list of cloud hacking labs☆25Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Jenkins Security Research or Hacking Jenkins ;)☆11Updated 4 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago