grines / scour
☆125Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for scour
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆220Updated 4 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆113Updated last year
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- Cloud agnostic IAM permissions enumerator☆139Updated 2 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆133Updated 4 years ago
- ☆58Updated last year
- ☆133Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- Burp with Friends☆99Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆203Updated last week
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆102Updated 5 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- Scan DockerHub images that match a keyword to find secrets.☆54Updated 3 years ago
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- ☆110Updated last year
- Fetch the details of assets hosted on AWS.☆86Updated 11 months ago
- S3 Account Search☆246Updated last month
- Assorted tools for security-related task for git repositories☆59Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated last year
- ☆144Updated 2 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆181Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆87Updated 2 years ago
- Kubernetes Pwnage for all☆54Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- Tools to assess the DNS security of web applications☆125Updated 2 years ago
- Burp Extension for AWS Signing☆86Updated last month