nagwww / s3-leaksView external linksLinks
List of S3 Hacks
☆437Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for s3-leaks
Users that are interested in s3-leaks are comparing it to the libraries listed below
Sorting:
- AWS S3 Hacks☆79Oct 31, 2018Updated 7 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,456Apr 10, 2024Updated last year
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,998Dec 11, 2025Updated 2 months ago
- S3 Account Search☆35Jul 25, 2025Updated 6 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,065Updated this week
- Enumerate the permissions associated with AWS credential set☆1,217Feb 5, 2024Updated 2 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Apr 23, 2020Updated 5 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Facebook Bug Bounties☆105Feb 24, 2021Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆534Mar 7, 2022Updated 3 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆998Feb 10, 2026Updated last week
- Awesome cloud enumerator☆1,092Mar 9, 2025Updated 11 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,017Jul 12, 2025Updated 7 months ago
- WeirdAAL (AWS Attack Library)☆835Jan 13, 2025Updated last year
- A collection of AWS penetration testing junk☆1,217Aug 30, 2023Updated 2 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Burp extension to perform Java Deserialization Attacks☆216Feb 2, 2024Updated 2 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆752Oct 14, 2023Updated 2 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Apr 24, 2018Updated 7 years ago
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Mar 18, 2024Updated last year
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,401Oct 16, 2025Updated 4 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,475Updated this week
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆647Nov 21, 2019Updated 6 years ago