projectdiscovery / cloudlist
Cloudlist is a tool for listing Assets from multiple Cloud Providers.
☆919Updated this week
Alternatives and similar repositories for cloudlist:
Users that are interested in cloudlist are comparing it to the libraries listed below
- Awesome cloud enumerator☆991Updated 3 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆863Updated last year
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆415Updated 5 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆629Updated last year
- Go client to communicate with Chaos DB API.☆694Updated this week
- Golang client for querying SecurityTrails API data☆546Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆620Updated 5 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆510Updated last year
- Automating situational awareness for cloud penetration tests.☆2,064Updated 2 weeks ago
- ☆318Updated 2 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆405Updated 2 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆269Updated 6 months ago
- A rapid API for the Project Sonar dataset☆645Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,775Updated 5 months ago
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆1,046Updated this week
- Vulnerability Scan with Nuclei☆251Updated 4 months ago
- S3 Account Search☆269Updated 5 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆378Updated 11 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆636Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆946Updated 3 months ago
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆354Updated 9 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆284Updated 3 years ago
- Identify privilege escalation paths within and across different clouds☆685Updated 4 months ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆930Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆494Updated last year
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆381Updated 5 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆963Updated 2 months ago
- OWASP Domain Protect - prevent subdomain takeover☆400Updated 3 months ago
- Enumerate the permissions associated with AWS credential set☆1,142Updated last year
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆688Updated last year