An AWS metadata enumeration tool by Plerion
☆102Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for conditional-love
Users that are interested in conditional-love are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 11 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago
- ☆231Mar 27, 2026Updated last month
- A collection of documented and undocumented AWS API models☆54Nov 21, 2025Updated 5 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Apr 20, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated least-privilege enforcement for AWS IAM. Analyzes CloudTrail data to compute permission utilization metrics and generates polic…☆13Jan 12, 2026Updated 3 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆287Nov 27, 2025Updated 5 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- jws2pubkey tool☆44Jun 27, 2025Updated 10 months ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆38May 1, 2023Updated 3 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Firebase Domain Front Code☆21May 4, 2021Updated 5 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 4 months ago
- AWS STS token decoder☆47Mar 18, 2025Updated last year
- ☆38Jun 9, 2021Updated 4 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆262Dec 5, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Apr 13, 2026Updated 3 weeks ago
- ☆23Sep 20, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- cloudgrep is grep for cloud storage☆329Mar 14, 2026Updated last month
- ☆40Aug 2, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- WeirdAAL (AWS Attack Library)☆841Jan 13, 2025Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆20Feb 9, 2024Updated 2 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆34Jun 12, 2024Updated last year
- Enumerate the permissions associated with AWS credential set☆1,232Feb 5, 2024Updated 2 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆41Jan 25, 2026Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆292May 16, 2025Updated 11 months ago
- Automating situational awareness for cloud penetration tests.☆2,370Apr 21, 2026Updated 2 weeks ago
- ☆72Jan 8, 2025Updated last year
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago