There are 7 repositories under misconfiguration topic.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Tfsec is now part of Trivy
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Kubernetes-native security toolkit
Windows Local Privilege Escalation Cookbook
An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.
yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
A Trivy plugin that scans and outputs the results (vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more) to an interactive html file.
⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs.
Plugin for YATAS that audits AWS accounts for misconfiguration and security issues
DroidSniper - Misconfigured Android Debug Bridge Scanner
Security insights for AWS IAM in large-scale accounts (20K+ users), bypassing CSPM limitations.
Fast CORS Misconfiguration Scanner
SecretKeeper is a tool for detecting secrets and misconfigurations on your Git repositories (Bitbucket and GitHub).
Env Breaker adalah Pemindaian dan deteksi file .env pada situs-situs target. Skrip ini membantu mengidentifikasi kemungkinan kebocoran informasi sensitif yang terkait dengan file .env
Plugin for YATAS that audits GCP projects for misconfiguration and security issues
This script automate exploit only cloud service
FireSploit is a powerful tool for ethical hackers, developers, and security researchers. It helps find and fix misconfigured Firebase databases that are exposing sensitive data to the public. By scanning for open read/write access, it helps you secure your applications and prevent data breaches.
⚛️ nucleo is a script that checks common vulnerabilities and security misconfigurations, strongly inspired by nuclei.
This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test
NetGun is a free and open source tool for port scanning, services enumeration, misconfigurations testing and CVE research. This is only for testing, official repository: https://github.com/MyCr4ck/NetGun_Classe03
AWS S3 bucket scanner | Find exposed S3 buckets, Azure Blob & Google Cloud Storage | Cloud security scanner tool | Bucket enumeration & vulnerability detection
Automation tools untuk mendeteksi celah misconfig Host Header injection
Azure services configuration analyzer
Securing S3 buckets: Test public access, apply policies and encryption, and detect misconfigurations with AWS Trusted Advisor. Includes screenshots, policy examples, and clear documentation.
A Firebase security scanner that checks for common misconfigurations in Auth, RTDB, Firestore, and Storage, reporting risks in a clear JSON format.
Microsoft Cloud Purple tool
Argus-AD is a comprehensive Active Directory security assessment tool designed for SYSADMINs and IT Admins to identify misconfigurations, privilege escalation paths, lateral movement opportunities, and hybrid identity issues in their Active Directory environments.
⚠️ Description only - code is confidential. Automates cloud security assessments for AWS, Azure, and GCP to detect misconfigurations and perform controlled exploitation.