Automating situational awareness for cloud penetration tests.
☆2,382Apr 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for cloudfox
Users that are interested in cloudfox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,178Apr 27, 2026Updated 3 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,319May 13, 2026Updated last week
- Multi-Cloud Security Auditing Tool☆7,658Sep 23, 2025Updated 7 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,552Aug 2, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,076Jul 12, 2025Updated 10 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,599Apr 28, 2026Updated 3 weeks ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,388Mar 9, 2026Updated 2 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,018May 20, 2025Updated last year
- A collection of scripts for assessing Microsoft Azure security☆2,378Mar 15, 2026Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,818Apr 6, 2026Updated last month
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,026May 4, 2026Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆446May 1, 2026Updated 2 weeks ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,657May 5, 2026Updated 2 weeks ago
- Azure Security Resources and Notes☆1,747Feb 17, 2026Updated 3 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,252Apr 24, 2026Updated 3 weeks ago
- Adversary Emulation Framework☆11,206May 7, 2026Updated last week
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,117Nov 9, 2024Updated last year
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,840Updated this week
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,700Jan 8, 2024Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,276Mar 19, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆565Mar 12, 2026Updated 2 months ago
- Awesome cloud enumerator