ustayready / cloudgpt
Vulnerability scanner for AWS customer managed policies using ChatGPT
☆143Updated last year
Alternatives and similar repositories for cloudgpt:
Users that are interested in cloudgpt are comparing it to the libraries listed below
- An open-source self-hosted purple team management web application.☆250Updated last week
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆90Updated 10 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆145Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆247Updated 2 months ago
- Tool to discover external and internal network attack surface☆193Updated 8 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆164Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆223Updated 4 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆98Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 3 months ago
- Collection of offensive tools targeting Microsoft Azure☆204Updated 2 years ago
- Halberd : Multi-Cloud Attack Platform☆241Updated last week
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- ☆169Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆99Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆110Updated last week
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 5 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆180Updated 7 months ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- ☆53Updated last year
- Azure mindmap for penetration tests☆175Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆90Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆99Updated last year
- ☆156Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆118Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆113Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 3 months ago