carlospolop / Cloudtrail2IAMView external linksLinks
☆24Mar 20, 2023Updated 2 years ago
Alternatives and similar repositories for Cloudtrail2IAM
Users that are interested in Cloudtrail2IAM are comparing it to the libraries listed below
Sorting:
- ☆13Mar 31, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- ☆140Dec 31, 2025Updated last month
- ☆16Feb 10, 2025Updated last year
- ☆96Jul 23, 2025Updated 6 months ago
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- ☆65May 21, 2024Updated last year
- A curated checklist of tasks to be done during engagements☆34Aug 30, 2024Updated last year
- ☆35Jan 27, 2023Updated 3 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- ☆11May 1, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 10 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Deploy Kubernetes Helm Charts for Check Point CloudGuard☆19Oct 21, 2025Updated 3 months ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- ☆11Jan 3, 2023Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 2 weeks ago
- ☆13Nov 5, 2024Updated last year
- Subdomain enumeration using Cloudflare's scanning tool.☆47Jul 11, 2025Updated 7 months ago
- ☆38Apr 7, 2023Updated 2 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 2 weeks ago
- ☆13Jun 10, 2024Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- ☆16Nov 30, 2025Updated 2 months ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- ☆12Jun 17, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago