securisec / cliamLinks
Cloud agnostic IAM permissions enumerator
☆161Updated 9 months ago
Alternatives and similar repositories for cliam
Users that are interested in cliam are comparing it to the libraries listed below
Sorting:
- A utility to convert your AWS CLI credentials into AWS console access.☆255Updated 5 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated last year
- S3 Account Search☆33Updated 6 months ago
- Tools to assess DNS security.☆153Updated last year
- ☆127Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆243Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- A GraphQL enumeration and extraction tool☆134Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated last year
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Updated 10 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆180Updated last month
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 3 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆120Updated 6 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- ☆114Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆276Updated 8 months ago
- This repository contain any information that can be used to hack Kubernetes☆111Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- Kubernetes exploitation tool☆364Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Updated 4 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Updated last year
- WAF bypass PoC☆50Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- ☆145Updated last year