List of S3 Hacks
☆446Dec 9, 2025Updated 4 months ago
Alternatives and similar repositories for s3-leaks
Users that are interested in s3-leaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Tool to Look For Interesting Files in S3 Buckets☆1,460Apr 10, 2024Updated 2 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,063Updated this week
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,166Updated this week
- Enumerate the permissions associated with AWS credential set☆1,231Feb 5, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- S3 Account Search☆42Jul 25, 2025Updated 9 months ago
- WeirdAAL (AWS Attack Library)☆840Jan 13, 2025Updated last year
- Facebook Bug Bounties☆106Feb 24, 2021Updated 5 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Apr 23, 2020Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆535Mar 7, 2022Updated 4 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18Sep 10, 2021Updated 4 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,064Jul 12, 2025Updated 9 months ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Amazon bucket brute force tool☆102Jun 24, 2013Updated 12 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,438Apr 17, 2026Updated last week
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,554Updated this week
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆376Feb 23, 2024Updated 2 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆769Oct 14, 2023Updated 2 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,019Apr 20, 2026Updated last week
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Awesome cloud enumerator☆1,118Mar 9, 2025Updated last year
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆60Sep 2, 2021Updated 4 years ago
- ☆11May 25, 2024Updated last year
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,803Feb 28, 2025Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,550Aug 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Nov 12, 2019Updated 6 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Bamboofox blog☆11Oct 19, 2022Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Mar 18, 2024Updated 2 years ago
- ☆16Dec 7, 2025Updated 4 months ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago