primait / nuvolaLinks
☆140Updated this week
Alternatives and similar repositories for nuvola
Users that are interested in nuvola are comparing it to the libraries listed below
Sorting:
- ☆55Updated 2 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆110Updated 11 months ago
- ☆50Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- ☆114Updated 2 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆107Updated last year
- ☆182Updated 6 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- Tools to assess DNS security.☆153Updated last year
- ☆126Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- boostsecurityio/lotp☆136Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 10 months ago
- ☆192Updated 6 months ago
- ☆60Updated 2 years ago
- ☆94Updated 3 years ago
- ☆40Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 5 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆156Updated 6 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆39Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- Scan your account for the use of untrusted AMIs☆30Updated 2 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆138Updated this week