Tool for reconnaissance of AWS cloud environments
☆16Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for awsrecon
Users that are interested in awsrecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Pentesting notes☆19Jan 31, 2026Updated last month
- 🚀 A curated collection of python pentesting and hacking scripts 👨💻☆10Nov 21, 2022Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Mar 12, 2026Updated 2 weeks ago
- ☆36May 27, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated last month
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 11 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- ☆14Feb 23, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Subdomain Scan (knockpy) in Python3☆13Oct 4, 2020Updated 5 years ago
- ☆19Apr 20, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated last year
- ☆24Oct 18, 2022Updated 3 years ago
- ☆21Jan 8, 2026Updated 2 months ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- Matos is an open-source cloud security tool for analyzing multi-cloud infrastructure security.☆17Feb 16, 2023Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Apr 21, 2019Updated 6 years ago
- A more functional and versatile way to search and filter SEC 4 form filing details (insider trading). Find trades of interest by ticker,…☆10Jan 19, 2022Updated 4 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆115Nov 19, 2022Updated 3 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago
- Modular C2 server to tame your pack of wolves☆24Mar 14, 2026Updated last week
- AWS CloudFormation template to set up AWS Config to record only what’s needed for Security Hub.☆13Jul 12, 2023Updated 2 years ago