RhinoSecurityLabs / cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
☆2,893Updated last week
Related projects: ⓘ
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,306Updated last month
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆1,640Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆1,896Updated last month
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,710Updated this week
- Multi-Cloud Security Auditing Tool☆6,593Updated last week
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆644Updated 11 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,406Updated last month
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆892Updated 5 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆8,901Updated 8 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,509Updated 11 months ago
- Cloud Security Posture Management (CSPM)☆3,302Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,742Updated this week
- A collection of AWS penetration testing junk☆1,162Updated last year
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,237Updated 7 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆905Updated last year
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,507Updated this week
- Security Remediation Guides☆698Updated last month
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆931Updated last week
- Enumerate the permissions associated with AWS credential set☆1,073Updated 7 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,382Updated 3 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,031Updated 3 months ago
- TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how…☆1,135Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆1,965Updated this week
- WeirdAAL (AWS Attack Library)☆773Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,352Updated last week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆1,908Updated 2 months ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,138Updated last year
- Exploits written by the Rhino Security Labs team☆1,053Updated 3 years ago
- A repository of breaches of AWS customers☆686Updated this week
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,263Updated 2 weeks ago