An AWS metadata enumeration tool by Plerion
☆101Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for conditional-love
Users that are interested in conditional-love are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- ☆229Mar 10, 2026Updated 2 weeks ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 4 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Updated this week
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Automated least-privilege enforcement for AWS IAM. Analyzes CloudTrail data to compute permission utilization metrics and generates polic…☆13Jan 12, 2026Updated 2 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆120Mar 16, 2026Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- jws2pubkey tool☆44Jun 27, 2025Updated 8 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 3 months ago
- AWS STS token decoder☆46Mar 18, 2025Updated last year
- ☆38Jun 9, 2021Updated 4 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- ☆23Sep 20, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated last week
- ☆40Aug 2, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- WeirdAAL (AWS Attack Library)☆838Jan 13, 2025Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- ☆33Jun 12, 2024Updated last year
- Enumerate the permissions associated with AWS credential set☆1,229Feb 5, 2024Updated 2 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆36Jan 25, 2026Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆289May 16, 2025Updated 10 months ago
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- ☆71Jan 8, 2025Updated last year
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month