google / gcp_scannerLinks
A comprehensive scanner for Google Cloud
☆351Updated 2 months ago
Alternatives and similar repositories for gcp_scanner
Users that are interested in gcp_scanner are comparing it to the libraries listed below
Sorting:
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆410Updated 4 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆283Updated 8 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Updated 2 weeks ago
- ☆192Updated 9 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- Protect against subdomain takeover☆95Updated 6 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆428Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆155Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆122Updated 2 years ago
- boostsecurityio/lotp☆138Updated 2 weeks ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆90Updated 3 months ago
- ☆115Updated 5 months ago
- boostsecurityio/poutine☆361Updated last week
- ☆185Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Updated 2 weeks ago
- ☆114Updated 2 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆373Updated 4 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated last month
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆493Updated 7 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆141Updated 3 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Updated 6 months ago
- ☆381Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆430Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Updated last year
- An AWS IAM policy statement parser and query tool.☆197Updated last week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆280Updated 2 months ago