A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation
☆109Feb 16, 2024Updated 2 years ago
Alternatives and similar repositories for cognito-scanner
Users that are interested in cognito-scanner are comparing it to the libraries listed below
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- ☆16Jul 17, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- ☆51Jun 13, 2024Updated last year
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆288May 16, 2025Updated 9 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 4 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- ☆14Jan 8, 2026Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆338Feb 21, 2026Updated 2 weeks ago
- ☆36Jun 21, 2024Updated last year
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆142Jun 7, 2025Updated 9 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- ☆38Jun 9, 2021Updated 4 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Updated this week
- ☆40Nov 29, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- ☆520Apr 29, 2024Updated last year
- ☆93Apr 29, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆321Nov 12, 2025Updated 3 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆92Aug 25, 2023Updated 2 years ago