AWS IAM resources search tool
☆21May 5, 2021Updated 4 years ago
Alternatives and similar repositories for awsdigger
Users that are interested in awsdigger are comparing it to the libraries listed below
Sorting:
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- A search-extension, providing quick, fuzzy-search results for AWS developers. Includes AWS API, AWS CLI and AWS CloudFormation references…☆18Updated this week
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- ☆30Mar 2, 2023Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Jul 1, 2019Updated 6 years ago
- Automated Multi-Cloud Application Deployment using terraform. The inter-connectivity between the public clouds is preformed using Site-T…☆11Sep 24, 2020Updated 5 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- python scripts for interacting with aws☆10Jan 21, 2022Updated 4 years ago
- An open-source, real-time, unified console to view and manage PagerDuty incidents.☆11Feb 14, 2026Updated 3 weeks ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- Null-free shellcode for running calc.exe on Windows x64☆13Mar 24, 2024Updated last year
- 我把 Terraform 的 101 種姿勢都放在那裡了☆10Jul 11, 2019Updated 6 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Slack bot for site reliability engineering☆11Updated this week
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- ☆11Nov 30, 2021Updated 4 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- Example code for using a GCP Service Account to acquire AWS IAM Role credentials☆11Jan 10, 2026Updated last month
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 4 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Automation to apply AWS Compute Optimizer Recommendations to EC2 Instances☆10May 6, 2024Updated last year
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- An embedded key/value database for Go.☆11Feb 18, 2022Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago