praetorian-inc / konstellationLinks
Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.
☆31Updated last week
Alternatives and similar repositories for konstellation
Users that are interested in konstellation are comparing it to the libraries listed below
Sorting:
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- Tool to spray AWS Console IAM Logins☆34Updated 3 years ago
- ☆60Updated 2 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Find what egress ports are allowed☆46Updated 3 weeks ago
- Scan your account for the use of untrusted AMIs☆30Updated last week
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆30Updated last week
- ☆19Updated last year
- An Evil OIDC Server☆54Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 4 months ago
- ☆19Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆81Updated 3 weeks ago
- ☆50Updated last year
- WAF bypass PoC☆49Updated 2 years ago
- ☆36Updated 4 years ago
- Putting the C2 in C2loudflare☆18Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆15Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆17Updated this week
- ☆31Updated 2 years ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆77Updated 2 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago