Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)
☆22Updated this week
Alternatives and similar repositories for cloudranger
Users that are interested in cloudranger are comparing it to the libraries listed below
Sorting:
- deep file scanner tool☆41Aug 13, 2025Updated 6 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- ☆13Jan 30, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Provides a generator that installs everything you need for a secure passwordless and two-factor authentication flow using WebAuthn, built…☆37Dec 3, 2025Updated 2 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- ☆23Sep 20, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆28Feb 20, 2026Updated last week
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Validate the isolation posture of your container environment.☆312Feb 11, 2026Updated 2 weeks ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- ☆30Jan 13, 2026Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A tool that allows downloading S3 directories as ZIP files☆34Apr 28, 2023Updated 2 years ago
- Collection of all previous 1337UP CTF challenges.☆78Jan 6, 2025Updated last year
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆90Feb 21, 2025Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- ☆46Nov 7, 2024Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- ☆40Nov 29, 2024Updated last year