shabarkin / aws-enumeratorLinks
The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testing. The tool is intended to speed up the process of Cloud review in case the security researcher compromised AWS Account Credentials.
☆218Updated 3 years ago
Alternatives and similar repositories for aws-enumerator
Users that are interested in aws-enumerator are comparing it to the libraries listed below
Sorting:
- S3 Account Search☆14Updated 3 weeks ago
- Cloud agnostic IAM permissions enumerator☆153Updated 4 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated 5 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆237Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆338Updated 5 months ago
- ☆89Updated last month
- A utility to convert your AWS CLI credentials into AWS console access.☆241Updated 5 years ago
- Web Application Security Testing Tools☆247Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆78Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- A collection of useful commands, scripts and resources for the OSWA (WEB-200) exam of Offensive Security☆99Updated 2 years ago
- ☆257Updated last year
- Tools to assess DNS security.☆152Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆397Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆95Updated last year
- Damn Vulnerable Cloud Application☆197Updated 6 years ago
- ☆131Updated 4 years ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆198Updated 9 months ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆110Updated 4 years ago
- ☆109Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated 8 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆187Updated 3 years ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆194Updated 11 months ago
- Intentionaly very vulnerable API with bonus bad coding practices☆48Updated last year
- Damn Vulnerable Thick Client App developed in C# .NET☆156Updated 2 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆426Updated 7 months ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago