Tools to automate AWS Cloud security assessments
☆24Mar 26, 2020Updated 6 years ago
Alternatives and similar repositories for aws-audit-automation
Users that are interested in aws-audit-automation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- Search the common crawl using lambda functions☆94Mar 15, 2019Updated 7 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- ☆11Nov 13, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- Code samples for SQL Server Discovery using the Microsoft Assessment and Planning (MAP) toolkit☆11Dec 9, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- secrets-helper helps you use AWS Secrets Manager to secure the use of CLI tools☆18Jun 9, 2020Updated 5 years ago
- Collection of AWS Lambda functions in Python☆11Mar 13, 2019Updated 7 years ago
- Webhook plugin for HashiCorp Vault☆14Jun 17, 2018Updated 7 years ago
- ☆12Jun 24, 2024Updated last year
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆19Sep 27, 2020Updated 5 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 12 years ago
- Shodan Port Scanner☆43Sep 30, 2020Updated 5 years ago
- Enumerate the permissions associated with AWS credential set☆1,231Feb 5, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Jul 15, 2021Updated 4 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 7 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago