Vulnerability scanner for AWS customer managed policies using ChatGPT
☆164Apr 17, 2023Updated 2 years ago
Alternatives and similar repositories for cloudgpt
Users that are interested in cloudgpt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Mar 28, 2025Updated last year
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Dec 14, 2025Updated 3 months ago
- Find subdomains with GPT, for free☆353Apr 18, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Collection's of Tech Talk that are presented by me :)☆102Jan 12, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆19Nov 28, 2024Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆298Sep 8, 2023Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆889May 3, 2023Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 3 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆17Mar 11, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- This Burp Suite extension allows you to copy HTTP requests without including cookies or tokens.☆37Jun 14, 2023Updated 2 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- Autonomous penetration testing using a swarm of AI agents. Orchestrates recon, classification, exploitation, and reporting specialists wi…☆224Mar 28, 2026Updated 2 weeks ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆749Jul 29, 2025Updated 8 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Jun 22, 2023Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆24Apr 28, 2024Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Sep 20, 2024Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- An Interface for AI built for cybersecurity professionals☆94Feb 19, 2025Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆698Feb 23, 2026Updated last month
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated last month
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automating situational awareness for cloud penetration tests.☆2,335Mar 24, 2026Updated 2 weeks ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 4 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆325May 1, 2025Updated 11 months ago
- cloudgrep is grep for cloud storage☆327Mar 14, 2026Updated 3 weeks ago
- Collection of offensive tools targeting Microsoft Azure☆220Apr 1, 2026Updated last week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year