A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆340Apr 1, 2026Updated 2 weeks ago
Alternatives and similar repositories for yatas
Users that are interested in yatas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,342Apr 13, 2026Updated last week
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- cloudgrep is grep for cloud storage☆328Mar 14, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆201Jan 6, 2026Updated 3 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,018Updated this week
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆178Jan 12, 2026Updated 3 months ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆285Nov 27, 2025Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- List of known AWS accounts☆257Apr 2, 2026Updated 2 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,295Updated this week
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Apr 6, 2026Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆441Feb 16, 2026Updated 2 months ago
- ☆116Feb 11, 2026Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆220Apr 1, 2026Updated 2 weeks ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆742Mar 26, 2026Updated 3 weeks ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆169May 6, 2023Updated 2 years ago
- Pass secrets as environment variables to a process☆127Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆51Jun 13, 2024Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆654Updated this week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,265Updated this week
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago
- ☆143Apr 12, 2026Updated last week
- Secrets scanner that understands code☆191Nov 2, 2023Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago