NSC42 / CloudSec-ToolsLinks
Cloud Security Tools
☆16Updated 5 years ago
Alternatives and similar repositories for CloudSec-Tools
Users that are interested in CloudSec-Tools are comparing it to the libraries listed below
Sorting:
- A Docker container for remote penetration testing.☆138Updated 4 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- ☆137Updated 2 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 2 months ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆25Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Offensive Terraform Website☆45Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 4 years ago
- Hardens Windows Server to CIS Standards☆40Updated 6 years ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆171Updated 9 months ago
- ☆75Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Multi Vagrant environment with Active Directory☆148Updated 7 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated 8 months ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆95Updated last year
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS, HIPAA HITRUST, NIST, and more acros …☆59Updated last week
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago