securisec / cliamLinks
Cloud agnostic IAM permissions enumerator
☆161Updated 8 months ago
Alternatives and similar repositories for cliam
Users that are interested in cliam are comparing it to the libraries listed below
Sorting:
- A utility to convert your AWS CLI credentials into AWS console access.☆251Updated 5 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆240Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆192Updated last year
- Tools to assess DNS security.☆153Updated last year
- ☆127Updated last year
- S3 Account Search☆32Updated 5 months ago
- ☆114Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆164Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- An AWS IAM Privilege Escalation Path Library☆77Updated 3 weeks ago
- Find CVE PoCs on GitHub☆156Updated 5 months ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆179Updated 2 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆274Updated 7 months ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Updated 9 months ago
- boostsecurityio/lotp☆138Updated 2 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated 3 months ago
- WAF bypass PoC☆50Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆191Updated 3 years ago
- ☆142Updated this week
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆122Updated 5 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆279Updated last year
- ☆106Updated 3 years ago