Route53/CloudFront Vulnerability Assessment Utility
☆86Sep 11, 2023Updated 2 years ago
Alternatives and similar repositories for cloudjack
Users that are interested in cloudjack are comparing it to the libraries listed below
Sorting:
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Mar 18, 2024Updated last year
- A tool for identifying misconfigured CloudFront domains☆362Jun 24, 2020Updated 5 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- WeirdAAL (AWS Attack Library)☆835Jan 13, 2025Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆496Nov 10, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- AWS managed IAM policies☆16Mar 24, 2022Updated 3 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Enumerate the permissions associated with AWS credential set☆1,219Feb 5, 2024Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- Red Team Scripts for AWS.☆169Jul 28, 2020Updated 5 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆16Jul 21, 2018Updated 7 years ago
- aws ssm public documents☆12Updated this week
- ☆10Aug 17, 2021Updated 4 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Apr 24, 2020Updated 5 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Cookiecutter template for building consistent Terraform modules.☆12Nov 5, 2015Updated 10 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Apr 22, 2020Updated 5 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- VirtualBox Disk Image Encryption password cracker☆31Oct 6, 2015Updated 10 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- Exploits written by the Rhino Security Labs team☆1,095Jan 23, 2021Updated 5 years ago