Lightspin AWS IAM Vulnerability Scanner
☆94Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for red-shadow
Users that are interested in red-shadow are comparing it to the libraries listed below
Sorting:
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Nov 18, 2022Updated 3 years ago
- S3 Account Search☆36Jul 25, 2025Updated 7 months ago
- ☆43Jun 2, 2021Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆127Jul 10, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆30Jan 13, 2026Updated last month
- ☆16Jul 17, 2024Updated last year
- ☆124May 26, 2025Updated 9 months ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- ☆108Oct 14, 2021Updated 4 years ago
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- ☆18Jul 30, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- An authentication API based on AWS Cognito☆20Feb 6, 2026Updated 3 weeks ago
- ☆51Jun 13, 2024Updated last year
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- Automated determination of which AWS services run where☆20Updated this week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆994Oct 4, 2022Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆606Nov 28, 2024Updated last year
- A production-friendly malware scanner for your AWS cloud☆201Jul 14, 2021Updated 4 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆261Dec 5, 2024Updated last year
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Mar 6, 2025Updated 11 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago