zer1t0 / awsenumLinks
Enumerate AWS permissions and resources.
☆70Updated 3 years ago
Alternatives and similar repositories for awsenum
Users that are interested in awsenum are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 11 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- A python3 script searching for secret on swaggerhub☆68Updated 3 years ago
- ☆27Updated 2 years ago
- ☆24Updated 6 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆99Updated 2 years ago
- ☆55Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Fast website scraper and wordlist generator☆81Updated 3 months ago
- Creates and sends fake meeting invite☆68Updated 4 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- ☆37Updated 3 weeks ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- ☆59Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- ☆42Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year