zer1t0 / awsenumView external linksLinks
Enumerate AWS permissions and resources.
☆71Jun 23, 2022Updated 3 years ago
Alternatives and similar repositories for awsenum
Users that are interested in awsenum are comparing it to the libraries listed below
Sorting:
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Python script to launch burp scans automatically☆33Jul 18, 2021Updated 4 years ago
- Saves pages to Wayback machine☆13Dec 2, 2024Updated last year
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆30Feb 2, 2026Updated last week
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 8 months ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆256May 7, 2020Updated 5 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A GraphQL enumeration and extraction tool☆134Jan 29, 2023Updated 3 years ago
- Apply a divide and conquer approach to bypass EDRs☆287Oct 19, 2023Updated 2 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- ☆106Jan 3, 2023Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆40May 5, 2024Updated last year
- Identify virtual hosts by similarity comparison☆137Aug 12, 2024Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆367Jun 24, 2025Updated 7 months ago
- Enumerate the permissions associated with AWS credential set☆1,217Feb 5, 2024Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 3 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Jun 17, 2022Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 1, 2026Updated 2 weeks ago
- aws cli pentesting/red team snippets☆32Jan 12, 2024Updated 2 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- WeirdAAL (AWS Attack Library)☆835Jan 13, 2025Updated last year
- Make URL path combinations using a wordlist☆169Sep 25, 2023Updated 2 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- A SOCKS proxy for Citrix.☆96Dec 8, 2022Updated 3 years ago
- 🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addi…☆85Sep 30, 2025Updated 4 months ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆217Jan 18, 2023Updated 3 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago