Lightspin AWS IAM Vulnerability Scanner
☆94Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for red-shadow
Users that are interested in red-shadow are comparing it to the libraries listed below
Sorting:
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Nov 18, 2022Updated 3 years ago
- S3 Account Search☆39Jul 25, 2025Updated 7 months ago
- ☆43Jun 2, 2021Updated 4 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- ☆127Jul 10, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆124May 26, 2025Updated 9 months ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- ☆30Jan 13, 2026Updated 2 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆999Oct 4, 2022Updated 3 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Jul 4, 2024Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A production-friendly malware scanner for your AWS cloud☆201Jul 14, 2021Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated last year
- ☆108Oct 14, 2021Updated 4 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 7 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Mar 6, 2025Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 8 months ago
- ☆51Jun 13, 2024Updated last year