Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.
☆78Mar 4, 2022Updated 3 years ago
Alternatives and similar repositories for s3_objects_check
Users that are interested in s3_objects_check are comparing it to the libraries listed below
Sorting:
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- FestIn - Open S3 Bucket Scanner☆231Dec 4, 2020Updated 5 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Nov 19, 2020Updated 5 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Sep 2, 2021Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- ☆16May 3, 2021Updated 4 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 3 months ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆162Apr 22, 2021Updated 4 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable☆55Dec 10, 2025Updated 2 months ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Feb 10, 2020Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- ☆124Nov 8, 2023Updated 2 years ago
- Monitors Github for leaked secrets☆205Oct 25, 2024Updated last year
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Jun 10, 2021Updated 4 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆606Nov 28, 2024Updated last year
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆277Sep 20, 2024Updated last year
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆28Apr 4, 2025Updated 10 months ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆28Feb 9, 2026Updated 2 weeks ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago