RhinoSecurityLabs / cloudgoatLinks
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
☆3,389Updated 2 weeks ago
Alternatives and similar repositories for cloudgoat
Users that are interested in cloudgoat are comparing it to the libraries listed below
Sorting:
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,986Updated 3 weeks ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,941Updated 6 months ago
- Automating situational awareness for cloud penetration tests.☆2,253Updated 3 weeks ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆737Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,529Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,770Updated last year
- Multi-Cloud Security Auditing Tool☆7,455Updated 2 months ago
- A collection of AWS penetration testing junk☆1,210Updated 2 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,381Updated last month
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆922Updated 6 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,209Updated 2 weeks ago
- Cloud Security Posture Management (CSPM)☆3,644Updated this week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,344Updated last month
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆985Updated 3 years ago
- Enumerate the permissions associated with AWS credential set☆1,207Updated last year
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,157Updated this week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,782Updated 2 months ago
- A repository of breaches of AWS customers☆791Updated last month
- WeirdAAL (AWS Attack Library)☆830Updated 10 months ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,471Updated 6 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,314Updated last year
- Security Remediation Guides☆744Updated last week
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,024Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆523Updated 2 months ago
- Exploits written by the Rhino Security Labs team☆1,086Updated 4 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,969Updated 4 months ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,163Updated 2 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,963Updated 2 weeks ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆944Updated 3 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,168Updated last year