Recon tool to query cloud prefixes for services associated with an IP address
☆23Oct 2, 2024Updated last year
Alternatives and similar repositories for cloudprefixes
Users that are interested in cloudprefixes are comparing it to the libraries listed below
Sorting:
- Expand IAM Actions with Wildcards☆34Updated this week
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- This project automates setup of Cost and Usage Reports (CUR) in a billing account with an Athena table enabling querying of the latest da…☆12Jan 23, 2026Updated last month
- Convert JSON IAM Policies to other formats☆25Updated this week
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month
- Daily Updates of AWS IAM Data☆22Updated this week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- ☆16Sep 26, 2016Updated 9 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- ☆19Mar 29, 2025Updated 10 months ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- ☆23Sep 12, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- ☆29Dec 26, 2025Updated 2 months ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Mar 24, 2025Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- ☆30Feb 16, 2026Updated last week
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆78Feb 25, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- ☆32Apr 1, 2025Updated 10 months ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆35Jul 20, 2023Updated 2 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- ☆75Mar 19, 2025Updated 11 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A tool that allows downloading S3 directories as ZIP files☆34Apr 28, 2023Updated 2 years ago
- free crypto audit☆31Mar 28, 2017Updated 8 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- ☆11Aug 12, 2025Updated 6 months ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago