An AWS metadata enumeration tool by Plerion
☆101Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for conditional-love
Users that are interested in conditional-love are comparing it to the libraries listed below
Sorting:
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Automated least-privilege enforcement for AWS IAM. Analyzes CloudTrail data to compute permission utilization metrics and generates polic…☆13Jan 12, 2026Updated last month
- ☆229Feb 24, 2026Updated last week
- ☆23Sep 20, 2024Updated last year
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 10 months ago
- AWS STS token decoder☆46Mar 18, 2025Updated 11 months ago
- ☆33Jun 12, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- ☆38Jun 9, 2021Updated 4 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆262Dec 5, 2024Updated last year
- ☆19Jan 31, 2025Updated last year
- ☆40Aug 2, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- ☆71Jan 8, 2025Updated last year
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year