Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.
☆278Sep 20, 2024Updated last year
Alternatives and similar repositories for ghostbuster
Users that are interested in ghostbuster are comparing it to the libraries listed below
Sorting:
- ☆11Jul 28, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- OWASP Domain Protect - prevent subdomain takeover☆397Dec 23, 2024Updated last year
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 11 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,012Mar 11, 2026Updated last week
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆408Dec 24, 2022Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,309Mar 10, 2026Updated last week
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 4 years ago
- Prototype pollution scanner using headless chrome☆217Jul 27, 2022Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 8 months ago
- Unleash the power of cloud☆816Nov 19, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆238Jan 10, 2024Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated 2 months ago
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated 2 months ago
- Automated learning of regexes for DNS discovery☆390Feb 18, 2023Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆959Dec 31, 2021Updated 4 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆779Aug 19, 2024Updated last year
- ☆383May 17, 2023Updated 2 years ago
- find dangling domains in a multi cloud environment☆176Dec 25, 2025Updated 2 months ago
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- ☆229Dec 18, 2025Updated 3 months ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆73Nov 22, 2021Updated 4 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆437Dec 30, 2025Updated 2 months ago
- ☆75Feb 11, 2024Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,042Jul 12, 2025Updated 8 months ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 8 months ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 8 months ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,297Aug 7, 2025Updated 7 months ago