projectdiscovery / cloudlistLinks
Cloudlist is a tool for listing Assets from multiple Cloud Providers.
☆971Updated 3 weeks ago
Alternatives and similar repositories for cloudlist
Users that are interested in cloudlist are comparing it to the libraries listed below
Sorting:
- Awesome cloud enumerator☆1,043Updated 6 months ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆427Updated 11 months ago
- Go client to communicate with Chaos DB API.☆766Updated last week
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆1,129Updated this week
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆383Updated last year
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆422Updated last month
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆641Updated 5 years ago
- Automating situational awareness for cloud penetration tests.☆2,192Updated this week
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,014Updated this week
- ProjectDiscovery's Open Source Tool Manager☆920Updated 2 weeks ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆430Updated 7 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,013Updated 2 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆942Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆705Updated 2 months ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆712Updated last year
- Vulnerability Scan with Nuclei☆262Updated last week
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,230Updated last month
- API Security Project aims to present unique attack & defense methods in API Security field☆286Updated 3 years ago
- Identify privilege escalation paths within and across different clouds☆701Updated 3 weeks ago
- Enumerate the permissions associated with AWS credential set☆1,187Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆671Updated last year
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆524Updated this week
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated 11 months ago
- Golang client for querying SecurityTrails API data☆570Updated 2 years ago
- Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a …☆1,502Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆519Updated this week
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆400Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆267Updated 2 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,006Updated 3 weeks ago
- ☆395Updated 3 years ago