BishopFox / cloudfox
Automating situational awareness for cloud penetration tests.
☆1,998Updated 2 weeks ago
Alternatives and similar repositories for cloudfox:
Users that are interested in cloudfox are comparing it to the libraries listed below
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆1,791Updated 2 weeks ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,475Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,884Updated this week
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆888Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,779Updated 2 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,138Updated 6 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,727Updated 3 months ago
- Awesome cloud enumerator☆934Updated 5 months ago
- Identify privilege escalation paths within and across different clouds☆676Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,608Updated 4 months ago
- My cheatsheet notes to pentest AWS infrastructure☆665Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,040Updated this week
- Cloud Security Posture Management (CSPM)☆3,398Updated this week
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆676Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,445Updated 5 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,115Updated 2 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆487Updated 11 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆927Updated 2 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,230Updated 7 months ago
- Enumerate the permissions associated with AWS credential set☆1,116Updated 11 months ago
- ☆611Updated this week
- Navigate the CVE jungle with ease.☆1,822Updated last week
- Security Remediation Guides☆714Updated last week
- WeirdAAL (AWS Attack Library)☆792Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,732Updated 2 years ago
- Azure and AWS Attacks☆1,085Updated 2 years ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,578Updated this week
- Pentest Report Generator☆2,368Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆345Updated 7 months ago