Cloud agnostic IAM permissions enumerator
☆161Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for cliam
Users that are interested in cliam are comparing it to the libraries listed below
Sorting:
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆277Sep 20, 2024Updated last year
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- ☆109Feb 21, 2023Updated 3 years ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 5 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆104Mar 17, 2023Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Nov 18, 2022Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆500Jan 23, 2023Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆908Oct 15, 2024Updated last year
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Fast website scraper and wordlist generator☆82May 6, 2025Updated 9 months ago
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆280Jan 15, 2025Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month