BishopFox / cloudfox
Automating situational awareness for cloud penetration tests.
☆1,955Updated last month
Related projects ⓘ
Alternatives and complementary repositories for cloudfox
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆1,729Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆1,829Updated last week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,399Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,748Updated 3 weeks ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆861Updated this week
- My cheatsheet notes to pentest AWS infrastructure☆656Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,686Updated last month
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆2,974Updated last week
- Awesome cloud enumerator☆894Updated 3 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,574Updated 2 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,123Updated 4 months ago
- Identify privilege escalation paths within and across different clouds☆667Updated 2 weeks ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆658Updated last year
- Cloud Security Posture Management (CSPM)☆3,358Updated this week
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,087Updated last week
- Peirates - Kubernetes Penetration Testing tool☆1,243Updated last month
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆480Updated 9 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,433Updated 2 weeks ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,205Updated 5 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆1,950Updated 4 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,573Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,433Updated 3 months ago
- Enumerate the permissions associated with AWS credential set☆1,098Updated 9 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆922Updated 2 years ago
- Security Remediation Guides☆709Updated this week
- ☆581Updated this week
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆787Updated 3 weeks ago
- Multi-Cloud Security Auditing Tool☆6,740Updated last month
- A repository of breaches of AWS customers☆706Updated this week
- Navigate the CVE jungle with ease.☆1,770Updated this week