Google Cloud Platform Security Tool
☆235Jul 30, 2019Updated 6 years ago
Alternatives and similar repositories for G-Scout
Users that are interested in G-Scout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for auditing security properties of GCP projects.☆159Jun 13, 2018Updated 7 years ago
- Security auditing tool for AWS environments☆1,721Nov 28, 2018Updated 7 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- A number of Recipes for AWS☆192Apr 26, 2019Updated 6 years ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,169Dec 8, 2022Updated 3 years ago
- Security auditing tool for Azure environments☆583Nov 4, 2022Updated 3 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆601Feb 12, 2022Updated 4 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Issues to consider when planning a red team exercise.☆613Aug 23, 2017Updated 8 years ago
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Forseti Security☆1,270Jun 5, 2023Updated 2 years ago
- AWS Auditing & Hardening Tool☆714Feb 4, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Multi-Cloud Security Auditing Tool☆7,609Sep 23, 2025Updated 6 months ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,459Apr 10, 2024Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,548Aug 2, 2024Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- GCP and GSUITE security auditing scripts☆27Apr 29, 2024Updated last year
- Testing/collecting some container breakouts☆94Jul 22, 2019Updated 6 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆491May 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆136May 9, 2024Updated last year
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- The iOS Security Testing Framework☆1,383Oct 25, 2020Updated 5 years ago
- Exploits written by the Rhino Security Labs team☆1,099Jan 23, 2021Updated 5 years ago
- ☆242Jun 15, 2024Updated last year
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago