DataDog / stratus-red-team
Granular, Actionable Adversary Emulation for the Cloud
☆2,004Updated this week
Alternatives and similar repositories for stratus-red-team
Users that are interested in stratus-red-team are comparing it to the libraries listed below
Sorting:
- Automating situational awareness for cloud penetration tests.☆2,104Updated 2 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆700Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,842Updated 3 months ago
- Security Remediation Guides☆724Updated 3 months ago
- This repo has been replaced by https://www.cloudvulndb.org☆725Updated 2 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,684Updated last month
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆989Updated last week
- Cloud Security Posture Management (CSPM)☆3,510Updated 2 weeks ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,165Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,485Updated 9 months ago
- Tool for building Kubernetes attack paths☆860Updated last week
- Peirates - Kubernetes Penetration Testing tool☆1,315Updated 3 weeks ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,200Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆500Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,171Updated 6 months ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆890Updated 4 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆949Updated 2 years ago
- A repository of breaches of AWS customers☆741Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,682Updated 7 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆381Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆567Updated 5 months ago
- Threat matrix for CI/CD Pipeline☆750Updated 10 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,467Updated last week
- Identify privilege escalation paths within and across different clouds☆692Updated 3 weeks ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,081Updated last week
- all paths lead to clouds☆638Updated last year
- ☆412Updated 2 years ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆282Updated 8 months ago
- BlueHound - pinpoint the security issues that actually matter☆734Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,076Updated last week