xmendez / awsdigger
AWS IAM resources search tool
☆21Updated 4 years ago
Alternatives and similar repositories for awsdigger:
Users that are interested in awsdigger are comparing it to the libraries listed below
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Enumerate AWS S3 buckets using different permutations☆16Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year
- List of special metadata IPs used in cloud services☆11Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27Updated 5 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- A command line security audit tool for Amazon Web Services☆81Updated 6 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- AWS S3 Sensitive Data Search☆36Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- Scans packages in npm and pypi for secrets☆31Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Updated 5 years ago
- This repository maintains some of the scripts made by Ebryx DevSecOps team.☆12Updated 2 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Security checks for your researches☆33Updated 4 years ago
- Offensive Terraform Website☆44Updated 4 years ago
- notes on configuring aws organizations☆11Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Tools for AWS forensics☆63Updated 9 years ago