lmoratti / risky-records
Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?
☆13Updated last month
Related projects ⓘ
Alternatives and complementary repositories for risky-records
- A meta-database collecting resources that compile lists of breaches☆18Updated last week
- A GitHub Actions Supply Chain CTF / Goat☆17Updated 4 months ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆18Updated 3 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆28Updated this week
- ☆58Updated last year
- ☆28Updated 3 months ago
- ☆25Updated 3 years ago
- Repository to archive GCP Documentation for local use☆13Updated last week
- A toolset to juggle AWS roles for persistent access☆51Updated 2 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 5 months ago
- ☆55Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- Tools to automate AWS Cloud security assessments☆23Updated 4 years ago
- WAF bypass PoC☆43Updated last year
- ☆40Updated 4 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- ☆22Updated this week
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆26Updated 3 weeks ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Updated last month
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated this week
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- Scripts to quickly fix security and compliance issues☆25Updated 11 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago