VirtueSecurity / IAMhounddogView external linksLinks
A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.
☆142Nov 14, 2025Updated 3 months ago
Alternatives and similar repositories for IAMhounddog
Users that are interested in IAMhounddog are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆117Sep 2, 2025Updated 5 months ago
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆85Feb 7, 2026Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Feb 8, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Group Policy Objects manipulation and exploitation framework☆289Dec 7, 2025Updated 2 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆222Apr 14, 2025Updated 10 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆68Oct 11, 2025Updated 4 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆174Updated this week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆40Aug 15, 2025Updated 6 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆310Updated this week
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆69Oct 30, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Jul 13, 2025Updated 7 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Jan 12, 2026Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 8 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- Cortex EDR Ransomware protection Bypass☆25Feb 8, 2025Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Updated this week
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆41Sep 16, 2025Updated 4 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- ☆23Sep 20, 2024Updated last year
- A modern open-source Kubernetes auditing and investigation tool☆21Sep 17, 2025Updated 4 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated last month
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 9 months ago
- A cmake template for crystal palace☆38Dec 20, 2025Updated last month
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 9 months ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago