Skip to content
View ell-max's full-sized avatar

Block or report ell-max

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Automated Red Team Infrastructure deployement using Docker

Python 1,253 206 Updated Aug 24, 2022

A curated list of awesome Amazon Web Services (AWS) libraries, open source repos, guides, blogs, and other resources. Featuring the Fiery Meter of AWSome.

Python 13,832 1,865 Updated Mar 12, 2024

AWS IAM linting library

Python 1,100 104 Updated Jun 18, 2025

A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure

HCL 736 103 Updated Oct 14, 2023

Multi-Cloud Security Auditing Tool

Python 7,455 1,163 Updated Sep 23, 2025

Data pipelines for cloud config and security data. Build cloud asset inventory, CSPM, FinOps, and vulnerability management solutions. Extract from AWS, Azure, GCP, and 70+ cloud and SaaS sources.

Go 6,255 543 Updated Nov 29, 2025

Cfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates how common configuration errors can find their way into produc…

96 640 Updated Aug 5, 2024

Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.

Go 5,196 538 Updated Nov 20, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 71,920 16,273 Updated Nov 15, 2025

Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

JavaScript 2,216 280 Updated Feb 25, 2023

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 14,155 2,478 Updated Oct 6, 2025

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,236 842 Updated Jul 15, 2024

Cloud-related research releases from the Rhino Security Labs team.

Python 392 68 Updated Apr 23, 2020

Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.

Python 875 150 Updated Mar 5, 2025