ustayready / cloudgptLinks
Vulnerability scanner for AWS customer managed policies using ChatGPT
☆166Updated 2 years ago
Alternatives and similar repositories for cloudgpt
Users that are interested in cloudgpt are comparing it to the libraries listed below
Sorting:
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 11 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- An open-source self-hosted purple team management web application.☆291Updated 3 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆254Updated last month
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆127Updated 4 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆178Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆267Updated 5 months ago
- Collection of offensive tools targeting Microsoft Azure☆212Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆110Updated 11 months ago
- AWS, Azure, Alibaba and Google bucket scanner☆160Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 9 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆254Updated 3 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆317Updated last month
- ☆173Updated 2 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆133Updated 3 years ago
- ☆166Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- Secret Magpie - Secret Detection Tool☆245Updated last year
- ☆35Updated 11 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆175Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated 2 months ago
- ☆240Updated 9 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- ☆195Updated 2 years ago