ekristen / azure-nukeView external linksLinks
Remove all resources from an Azure Tenant and it's Subscriptions.
☆55Feb 3, 2026Updated last week
Alternatives and similar repositories for azure-nuke
Users that are interested in azure-nuke are comparing it to the libraries listed below
Sorting:
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 7 years ago
- ☆26May 6, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- ☆23Sep 12, 2024Updated last year
- Challenge infrastructure used for the DownUnderCTF competition☆25Sep 8, 2025Updated 5 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆25Jul 5, 2018Updated 7 years ago
- A fork of the Go language with some tweaks☆55Jan 29, 2025Updated last year
- ☆23Sep 20, 2024Updated last year
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆26Feb 3, 2024Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- ☆75Mar 19, 2025Updated 10 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- A tool that allows downloading S3 directories as ZIP files☆35Apr 28, 2023Updated 2 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- 🌐 A web app that allows you to create smart bookmarks, commands and aliases by pointing your web browser's default search engine at a ru…☆15Jul 12, 2021Updated 4 years ago
- Examine Chrome extensions for security issues☆94Nov 16, 2025Updated 3 months ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- Lootbox downloads open directories shared on Twitter.☆35Mar 28, 2021Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated last month
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆94Nov 9, 2018Updated 7 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Terraform module to create and validate AWS ACM certificates with DNS validation via Route53☆10Dec 11, 2019Updated 6 years ago