projectdiscovery / cloudlist
Cloudlist is a tool for listing Assets from multiple Cloud Providers.
☆855Updated this week
Related projects ⓘ
Alternatives and complementary repositories for cloudlist
- Awesome cloud enumerator☆868Updated 3 months ago
- Go client to communicate with Chaos DB API.☆639Updated this week
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆588Updated 4 years ago
- Automating situational awareness for cloud penetration tests.☆1,930Updated 3 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆845Updated 9 months ago
- Enumerate the permissions associated with AWS credential set☆1,090Updated 9 months ago
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆993Updated this week
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆304Updated 4 months ago
- A utility to detect various technology for a given IP address.☆770Updated this week
- Fast and configurable TLS grabber focused on TLS based data collection.☆857Updated this week
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆482Updated last year
- Vulnerability Scan with Nuclei☆241Updated last month
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆674Updated last year
- Identify privilege escalation paths within and across different clouds☆665Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆380Updated 3 months ago
- Golang client for querying SecurityTrails API data☆538Updated last year
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆392Updated last week
- Find cloud assets that no one wants exposed 🔎 ☁️☆332Updated 4 years ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆352Updated last month
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆532Updated 10 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆265Updated last month
- OWASP Domain Protect - prevent subdomain takeover☆397Updated last month
- ☆555Updated 3 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,679Updated 3 weeks ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆875Updated 4 months ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆402Updated last week
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆871Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆477Updated 9 months ago
- ☆313Updated last month
- Cloud agnostic IAM permissions enumerator☆139Updated 2 months ago