NextSecurity / Awesome-Cloud-SecurityLinks
Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google
☆124Updated 4 years ago
Alternatives and similar repositories for Awesome-Cloud-Security
Users that are interested in Awesome-Cloud-Security are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆163Updated 2 years ago
- ☆242Updated 5 months ago
- Awesome list for cloud security related projects☆128Updated 2 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆119Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 5 months ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆354Updated 5 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 7 months ago
- List of questions, answers and random notes for security interviews☆68Updated 4 years ago
- DevSecOpsGuides☆187Updated 2 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆395Updated 7 months ago
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆272Updated 11 months ago
- CSbyGB PenTips Gitbook☆111Updated 3 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆246Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆336Updated 3 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆93Updated last year
- ☆39Updated last year
- Useful resources about phishing email analysis☆84Updated 4 months ago
- ☆33Updated 7 months ago
- ☆314Updated 11 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆279Updated last week
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆187Updated 11 months ago
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud…☆362Updated 2 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated last month
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆236Updated this week