Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.
☆277Sep 20, 2024Updated last year
Alternatives and similar repositories for ghostbuster
Users that are interested in ghostbuster are comparing it to the libraries listed below
Sorting:
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- ☆11Jul 28, 2020Updated 5 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 10 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆406Dec 24, 2022Updated 3 years ago
- Prototype pollution scanner using headless chrome☆218Jul 27, 2022Updated 3 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,005Feb 16, 2026Updated last week
- ☆89Feb 11, 2022Updated 4 years ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- ☆227Dec 18, 2025Updated 2 months ago
- Unleash the power of cloud☆818Nov 19, 2024Updated last year
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 3 years ago
- OWASP Domain Protect - prevent subdomain takeover☆399Dec 23, 2024Updated last year
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated 2 months ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆778Aug 19, 2024Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆238Jan 10, 2024Updated 2 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- ☆380May 17, 2023Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆238Oct 13, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆953Dec 31, 2021Updated 4 years ago
- ☆73Nov 22, 2021Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 3 years ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 7 months ago
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated last month
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 2 months ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 7 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 7 months ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- Automated learning of regexes for DNS discovery☆392Feb 18, 2023Updated 3 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- ☆43Nov 15, 2025Updated 3 months ago