A PoC to Simulate Ransomware Attack on AWS Environment
☆33Oct 14, 2024Updated last year
Alternatives and similar repositories for aws-redteam-kit
Users that are interested in aws-redteam-kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Mar 16, 2026Updated last week
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated last month
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆42Nov 13, 2025Updated 4 months ago
- ☆40Nov 29, 2024Updated last year
- ☆192Apr 16, 2025Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Mar 20, 2026Updated last week
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆91Feb 21, 2025Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- ☆14Jan 8, 2026Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated 2 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- ☆12Oct 15, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 3 months ago
- ☆12Sep 12, 2021Updated 4 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Expand IAM Actions with Wildcards☆35Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- ☆22Apr 17, 2023Updated 2 years ago
- ☆30May 12, 2025Updated 10 months ago
- Deception implementation through analysis of BloodHound data☆55Updated this week
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Easily generate reproducible infrastructure☆40Dec 3, 2025Updated 3 months ago