AWS STS token decoder
☆46Mar 18, 2025Updated last year
Alternatives and similar repositories for STS-token-decoder
Users that are interested in STS-token-decoder are comparing it to the libraries listed below
Sorting:
- ☆11Dec 19, 2024Updated last year
- nixos in a gameboy shell☆16Mar 10, 2026Updated last week
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago
- A repo to demonstrate a complete Terraform Demo☆13Jun 11, 2024Updated last year
- An easy way to give all your EC2 instances SSH host certificates☆16Feb 25, 2023Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- A Software as a Service (SaaS) log collection framework.☆184Updated this week
- NWI Engineering's use of Nix☆12Apr 17, 2023Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 9 months ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- ☆25Jan 22, 2025Updated last year
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 10 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated last year
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 4 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆13Jan 30, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- A Server Side Request Forgery (SSRF) protection library. Made with 🖤 by Doyensec LLC.☆112Jun 4, 2025Updated 9 months ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- Track AWS outages via Git History☆13May 26, 2023Updated 2 years ago
- ☆24Mar 20, 2023Updated 3 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Show diff automatically when git rebase☆32Jul 19, 2025Updated 8 months ago
- Find duplicate dependencies in flakes☆34Updated this week
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- ☆11Jun 10, 2020Updated 5 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year