A tool for pillaging Docker registries to extract image manifests and configurations.
Grayhat Warfare Buckets is a search engine for open Amazon S3 buckets and their contents. It allows users to search for files using keywords, filename extensions, and full path. The search engine treats all keywords as logical AND, and users can exclude keywords by adding a minus sign (-) before the keyword. The tool provides a way to discover exposed files and buckets on Amazon S3. The search engine provides various filters, including the ability to search for files containing specific keywords, excluding certain keywords, and searching by filename extensions. The tool also provides a random file search feature and a way to search public buckets. The tool is useful for security researchers, penetration testers, and organizations to identify exposed files and buckets on Amazon S3, which can help in identifying potential security risks.
A tool for pillaging Docker registries to extract image manifests and configurations.
Automate AWS security checks and centralize security alerts.
A framework for executing attacker actions in the cloud with YAML-based format for defining TTPs and detection properties, deployable via AWS-native CI/CD pipeline.
Lists Amazon S3 Buckets while browsing
A detection-as-code platform for streamlining cloud security operations and responding to security incidents.
Azure Guardrails enables rapid enforcement of cloud security guardrails by generating Terraform files for Azure Policy Initiatives.