A simple file-based scanner to look for potential AWS access and secret keys in files
☆94Mar 18, 2024Updated 2 years ago
Alternatives and similar repositories for cred_scanner
Users that are interested in cred_scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This command line tool counts the number of resources in different categories across Amazon regions.☆58Dec 17, 2019Updated 6 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆86Sep 11, 2023Updated 2 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- A tool for identifying misconfigured CloudFront domains☆363Jun 24, 2020Updated 5 years ago
- WeirdAAL (AWS Attack Library)☆841Jan 13, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆123Nov 2, 2019Updated 6 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 7 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆499Nov 10, 2022Updated 3 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆912Dec 17, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆27Jan 4, 2022Updated 4 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Resolve and quickly portscan a list of (sub)domains.☆88Jul 4, 2016Updated 9 years ago
- Tool to search secrets in various filetypes.☆1,033Apr 25, 2023Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆124Sep 2, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆11Jun 19, 2024Updated last year
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 3 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆651Nov 21, 2019Updated 6 years ago
- Minimalist containerized implementation of Prowler from https://github.com/toniblyx/prowler, made to run within ECS Fargate and have Secr…☆19May 17, 2019Updated 6 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆234Nov 4, 2018Updated 7 years ago
- Discover Printers☆167Sep 18, 2019Updated 6 years ago
- WD My Cloud PoC exploit☆42May 22, 2019Updated 6 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,550Aug 2, 2024Updated last year