WeAreCloudar / s3-account-searchView external linksLinks
S3 Account Search
☆35Jul 25, 2025Updated 6 months ago
Alternatives and similar repositories for s3-account-search
Users that are interested in s3-account-search are comparing it to the libraries listed below
Sorting:
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 2 months ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- Resource types that can be publicly exposed on AWS☆329Feb 23, 2022Updated 3 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,539Aug 2, 2024Updated last year
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Enumerate the permissions associated with AWS credential set☆1,217Feb 5, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,065Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆349Jul 20, 2020Updated 5 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- ☆576Jul 12, 2025Updated 7 months ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- WeirdAAL (AWS Attack Library)☆835Jan 13, 2025Updated last year
- ☆260Jun 28, 2024Updated last year
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 4 years ago
- List of known AWS accounts☆252Feb 6, 2026Updated last week
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆60Feb 5, 2025Updated last year
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- ☆127Jul 10, 2024Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆197Feb 10, 2026Updated last week
- ☆520Apr 29, 2024Updated last year
- Find exposed data in Azure with this public blob scanner☆349Jul 7, 2024Updated last year
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Nov 18, 2022Updated 3 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆245Apr 12, 2022Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143May 1, 2025Updated 9 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆994Oct 4, 2022Updated 3 years ago
- ☆228Jan 29, 2026Updated 2 weeks ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago