Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.
☆278Sep 20, 2024Updated last year
Alternatives and similar repositories for ghostbuster
Users that are interested in ghostbuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jul 28, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- OWASP Domain Protect - prevent subdomain takeover☆396Dec 23, 2024Updated last year
- Cloud agnostic IAM permissions enumerator☆160Apr 10, 2025Updated last year
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,017Apr 3, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆410Dec 24, 2022Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 11 months ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆76Mar 22, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,335Mar 24, 2026Updated 2 weeks ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Mar 12, 2022Updated 4 years ago
- Prototype pollution scanner using headless chrome☆217Jul 27, 2022Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 9 months ago
- Unleash the power of cloud☆816Nov 19, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,548Aug 2, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆237Jan 10, 2024Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated 3 months ago
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated 2 months ago
- Automated learning of regexes for DNS discovery☆391Feb 18, 2023Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆964Dec 31, 2021Updated 4 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆779Aug 19, 2024Updated last year
- ☆384May 17, 2023Updated 2 years ago
- find dangling domains in a multi cloud environment☆175Dec 25, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- ☆231Dec 18, 2025Updated 3 months ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- ☆73Nov 22, 2021Updated 4 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Jan 26, 2023Updated 3 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 3 months ago
- ☆75Feb 11, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,061Jul 12, 2025Updated 9 months ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 8 months ago
- Dependency Combobulator☆96Jan 10, 2024Updated 2 years ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 8 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,336Aug 7, 2025Updated 8 months ago