A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
☆340May 6, 2026Updated last week
Alternatives and similar repositories for yatas
Users that are interested in yatas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,378Apr 21, 2026Updated 3 weeks ago
- Cloud Exploit Framework☆112May 11, 2022Updated 4 years ago
- cloudgrep is grep for cloud storage☆329Mar 14, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Guidelines to work with Terraform☆31Feb 5, 2026Updated 3 months ago
- The state of my kubernetes cluster☆10Updated this week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆201Jan 6, 2026Updated 4 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,025May 4, 2026Updated last week
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆178Jan 12, 2026Updated 4 months ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆678Feb 17, 2026Updated 2 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆289Nov 27, 2025Updated 5 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,552Aug 2, 2024Updated last year
- List of known AWS accounts☆258Apr 2, 2026Updated last month
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,315Updated this week
- Proof of concept code for Datadog Security Labs referenced exploits.☆448Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆443May 1, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆116Feb 11, 2026Updated 3 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆70Sep 20, 2024Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆222Apr 1, 2026Updated last month
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Jun 2, 2022Updated 3 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆169May 6, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pass secrets as environment variables to a process☆127Updated this week
- ☆51Jun 13, 2024Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆656Updated this week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,275Apr 15, 2026Updated 3 weeks ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 3 months ago
- ☆143Updated this week
- Secrets scanner that understands code☆191Nov 2, 2023Updated 2 years ago