opendevsecops / guide-aws-hacking
This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaknesses you will be verse enough to provide the correct countermeasures.
☆170Updated 5 years ago
Alternatives and similar repositories for guide-aws-hacking:
Users that are interested in guide-aws-hacking are comparing it to the libraries listed below
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆377Updated 4 years ago
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- Search exposed EBS volumes for secrets☆297Updated last year
- ☆274Updated 3 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆130Updated 2 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- A simple file-based scanner to look for potential AWS access and secret keys in files☆90Updated 10 months ago
- AWS S3 Bucket/Object Finder☆118Updated 3 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆140Updated 2 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆241Updated 2 weeks ago
- Amazon bucket brute force tool☆96Updated 11 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆335Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- ☆241Updated 7 months ago
- A tool to enumerate S3 buckets manually or via certstream☆80Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆498Updated last year
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated last year
- A place to store my own wordlists, and link to others that are useful☆106Updated last year
- Red Team Scripts for AWS.☆167Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆99Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆349Updated 4 years ago
- A Docker container for remote penetration testing.☆134Updated 3 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆135Updated 2 years ago
- vulnerable single sign on☆147Updated 6 months ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆215Updated 5 years ago
- Find AWS S3 buckets and test their permissions.☆376Updated last year