CloudSecurityPartners / hack-aws-in-60-minutes
☆12Updated last year
Alternatives and similar repositories for hack-aws-in-60-minutes:
Users that are interested in hack-aws-in-60-minutes are comparing it to the libraries listed below
- Generates runbooks for GuardDuty findings☆35Updated 8 months ago
- ☆112Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆174Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Updated last year
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆151Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆69Updated 10 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆146Updated last month
- Tracker for Encryption by Default for AWS Resources☆14Updated 3 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆90Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆55Updated 3 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- Multicloud workload identity workshop☆36Updated 2 weeks ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆165Updated 4 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆38Updated last year
- ☆89Updated last year
- ☆41Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆87Updated 3 weeks ago
- https://breaches.cloud☆38Updated 5 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- ☆134Updated last year
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆59Updated 3 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year
- AWS SSO Reporter☆54Updated last year