Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)
☆23Mar 16, 2026Updated this week
Alternatives and similar repositories for cloudranger
Users that are interested in cloudranger are comparing it to the libraries listed below
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 3 weeks ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A library of policies for Pulumi's Policy as Code☆19Feb 1, 2026Updated last month
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- ☆14Mar 13, 2026Updated last week
- Sample code with security policies in Pulumi CrossGuard to implement preventive security checks in Infrastructure pipelines☆12Jan 4, 2023Updated 3 years ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Updated this week
- Large enterprises try to find a balance between controlling risk and empowering their developers in alignment with DevOps practices. Id…☆20Oct 28, 2021Updated 4 years ago
- Example of using boto3 to generate JSON for pulumi import☆13Sep 16, 2025Updated 6 months ago
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated 3 weeks ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 3 months ago
- ☆22Sep 9, 2019Updated 6 years ago
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- ☆13Jan 30, 2025Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- Protect against subdomain takeover☆95Jul 20, 2025Updated 8 months ago
- WAF bypass PoC☆50Oct 9, 2023Updated 2 years ago
- Cumulus. Threat modeling the Clouds.☆28Oct 27, 2025Updated 4 months ago
- ☆117Feb 11, 2026Updated last month
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Mar 10, 2026Updated last week
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 5 months ago
- Demonstrates building a multi-lang Pulumi component provider in Python☆23Oct 6, 2025Updated 5 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year