securisec / cliamLinks
Cloud agnostic IAM permissions enumerator
☆160Updated 7 months ago
Alternatives and similar repositories for cliam
Users that are interested in cliam are comparing it to the libraries listed below
Sorting:
- A utility to convert your AWS CLI credentials into AWS console access.☆249Updated 5 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆192Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated last year
- ☆126Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆235Updated 3 years ago
- S3 Account Search☆25Updated 4 months ago
- Tools to assess DNS security.☆153Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆121Updated 2 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated last month
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆177Updated last week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆191Updated 3 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆88Updated 8 months ago
- ☆114Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆107Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆273Updated 6 months ago
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆110Updated last year
- ☆104Updated 3 years ago
- ☆106Updated 2 years ago
- boostsecurityio/lotp☆138Updated last month
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated 2 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆122Updated 4 months ago
- WAF bypass PoC☆49Updated 2 years ago
- Kubernetes exploitation tool☆365Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year