A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆338Feb 21, 2026Updated 2 weeks ago
Alternatives and similar repositories for yatas
Users that are interested in yatas are comparing it to the libraries listed below
Sorting:
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated last year
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,006Updated this week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆437Feb 16, 2026Updated 2 weeks ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Jan 12, 2026Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- ☆109Feb 21, 2023Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- ☆159Jan 7, 2022Updated 4 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Aug 22, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆733Sep 17, 2025Updated 5 months ago
- Kubernetes exploitation tool☆362Feb 25, 2026Updated last week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165May 6, 2023Updated 2 years ago
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆345Aug 3, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated this week
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- ☆51Jun 13, 2024Updated last year
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆978Jan 12, 2024Updated 2 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,108Updated this week