grahamhelton / IMDSpoofView external linksLinks
IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.
☆106Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for IMDSpoof
Users that are interested in IMDSpoof are comparing it to the libraries listed below
Sorting:
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- ☆21Sep 23, 2025Updated 4 months ago
- ☆23Apr 28, 2024Updated last year
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134May 7, 2025Updated 9 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆433Feb 6, 2026Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Updated this week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated last month
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 10 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Expand IAM Actions with Wildcards☆34Feb 7, 2026Updated last week
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 4 years ago
- ☆18Feb 2, 2026Updated last week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- ☆30Jan 13, 2026Updated last month
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 8 months ago