Search the common crawl using lambda functions
☆94Mar 15, 2019Updated 7 years ago
Alternatives and similar repositories for cc-lambda
Users that are interested in cc-lambda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Manage GuardDuty At Enterprise Scale☆22Sep 17, 2020Updated 5 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Enumerate the permissions associated with AWS credential set☆1,229Feb 5, 2024Updated 2 years ago
- ☆51Aug 25, 2022Updated 3 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- Use Step Functions Distributed Map to run massively parallel DynamoDB migrations in AWS CDK☆22Dec 5, 2022Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Simple WebSockets API☆10Nov 18, 2021Updated 4 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Updated this week
- Generate OpenGraph images for your blogposts on-demand using Serverless☆14Mar 26, 2022Updated 3 years ago
- A recursive async iterator of the files and directories in a given directory. Can take multiple directories and files, limit walk depth a…☆19Dec 10, 2025Updated 3 months ago
- ☆54Jan 22, 2025Updated last year
- ☆18Oct 9, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 7 years ago
- AWS accounts as Git remotes☆14Mar 25, 2021Updated 4 years ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- Tool to help with the exploitation of web application race conditions☆184Jul 3, 2018Updated 7 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated last month
- ☆19Jun 26, 2017Updated 8 years ago
- Gathers urls from common crawl☆34Nov 9, 2019Updated 6 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Dec 15, 2019Updated 6 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Sep 11, 2023Updated 2 years ago
- Easy switch between AWS Profiles and Regions☆13Jul 21, 2022Updated 3 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆367Aug 25, 2025Updated 6 months ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Nov 3, 2020Updated 5 years ago
- Undocumented Amazon S3 APIs and third-party extensions☆70Feb 20, 2022Updated 4 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆498Nov 10, 2022Updated 3 years ago
- JIRA Secure Attachment Looter☆70Jun 27, 2020Updated 5 years ago
- OWASP Ukraine 2019 CTF☆12Feb 10, 2023Updated 3 years ago
- AWS AppSync Session Manager - a sample AppSync project☆18Feb 12, 2022Updated 4 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 4 years ago
- ☆24May 31, 2024Updated last year