nagwww / s3-leaks
List of S3 Hacks
☆391Updated 2 months ago
Alternatives and similar repositories for s3-leaks:
Users that are interested in s3-leaks are comparing it to the libraries listed below
- WeirdAAL (AWS Attack Library)☆794Updated last month
- Enumerate the permissions associated with AWS credential set☆1,130Updated last year
- Cloud-related research releases from the Rhino Security Labs team.☆377Updated 4 years ago
- Exploits written by the Rhino Security Labs team☆1,069Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆349Updated 4 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆242Updated 3 weeks ago
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆338Updated 8 months ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆501Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆615Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆519Updated 2 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆683Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆335Updated 4 years ago
- a Damn Vulnerable Serverless Application☆534Updated last year
- Security Tool to Look For Interesting Files in S3 Buckets☆1,386Updated 10 months ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆455Updated 2 years ago
- barq: The AWS Cloud Post Exploitation framework!☆387Updated 2 years ago
- Search exposed EBS volumes for secrets☆297Updated last year
- Find AWS S3 buckets and test their permissions.☆376Updated last year
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆170Updated 5 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆324Updated 6 months ago
- A collection of AWS penetration testing junk☆1,186Updated last year
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆831Updated 9 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,669Updated this week
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆903Updated 5 years ago
- ☆274Updated 3 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆493Updated last year
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- OWASP Domain Protect - prevent subdomain takeover☆401Updated last month
- Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functions☆236Updated this week
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆268Updated 5 months ago