Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments
☆143Jan 2, 2025Updated last year
Alternatives and similar repositories for cloud-security-vm
Users that are interested in cloud-security-vm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- ☆40Aug 2, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Mapping of open-source detection rules and atomic tests.☆208Feb 16, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated 3 weeks ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆41Aug 29, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Generate datasets of cloud audit logs for common attacks☆236Apr 23, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆77May 27, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 5 months ago
- Autonomous AI C2☆31Jul 23, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆179Jan 9, 2026Updated 3 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- ☆18Feb 2, 2026Updated 2 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆292May 16, 2025Updated 11 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Feb 2, 2024Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆122Apr 18, 2026Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated 3 weeks ago
- ☆30Jan 13, 2026Updated 3 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year