🛡️ Awesome Cloud Security Resources ⚔️
☆2,373Mar 17, 2026Updated this week
Alternatives and similar repositories for awesome-cloud-security
Users that are interested in awesome-cloud-security are comparing it to the libraries listed below
Sorting:
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,526Jan 28, 2026Updated last month
- ☆756Aug 26, 2022Updated 3 years ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆660May 20, 2025Updated 10 months ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,653Nov 23, 2025Updated 3 months ago
- ☆484Aug 12, 2022Updated 3 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,219Jan 20, 2026Updated 2 months ago
- ☆1,703Aug 19, 2022Updated 3 years ago
- Azure and AWS Attacks☆1,113Nov 25, 2022Updated 3 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,188Jul 15, 2024Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,554Feb 10, 2026Updated last month
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 6 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,908Oct 1, 2025Updated 5 months ago
- Ultimate DevSecOps library☆6,648Mar 5, 2026Updated 2 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Sep 17, 2024Updated last year
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆257Updated this week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,414Oct 16, 2025Updated 5 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,277Mar 12, 2026Updated last week
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,650Updated this week
- List of Awesome Red Teaming Resources☆7,834Dec 28, 2023Updated 2 years ago
- Cloud Security Posture Management (CSPM)☆3,717Feb 23, 2026Updated 3 weeks ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,984May 20, 2025Updated 10 months ago
- Automating situational awareness for cloud penetration tests.☆2,309Mar 10, 2026Updated last week
- Multi-Cloud Security Auditing Tool☆7,579Sep 23, 2025Updated 5 months ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,954Mar 1, 2026Updated 2 weeks ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,097Updated this week
- A curated list of web3Security materials and resources For Pentesters and Bug Hunters.☆1,560Mar 1, 2026Updated 2 weeks ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,435Mar 5, 2024Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,260Feb 10, 2026Updated last month
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆5,349May 11, 2024Updated last year
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,344Updated this week
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,510Updated this week
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,900Dec 31, 2025Updated 2 months ago
- Azure Security Resources and Notes☆1,716Feb 17, 2026Updated last month
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,084Jul 29, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,049Jun 25, 2025Updated 8 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,942Oct 7, 2023Updated 2 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,478Dec 31, 2025Updated 2 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,532Jan 5, 2026Updated 2 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,672Sep 8, 2023Updated 2 years ago