A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆340Mar 26, 2026Updated this week
Alternatives and similar repositories for yatas
Users that are interested in yatas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Guidelines to work with Terraform☆31Feb 5, 2026Updated last month
- The state of my kubernetes cluster☆10Updated this week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,012Mar 11, 2026Updated 2 weeks ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Jan 12, 2026Updated 2 months ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆676Feb 17, 2026Updated last month
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated 2 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Mar 9, 2026Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆438Feb 16, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆117Feb 11, 2026Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆220Jan 18, 2023Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆736Mar 5, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165May 6, 2023Updated 2 years ago
- Pass secrets as environment variables to a process☆128Updated this week
- ☆51Jun 13, 2024Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆650Mar 20, 2026Updated last week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,249Mar 19, 2026Updated last week
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month
- ☆143Mar 15, 2026Updated last week