AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, Pacu.
☆45Mar 5, 2021Updated 5 years ago
Alternatives and similar repositories for AWS-Attack
Users that are interested in AWS-Attack are comparing it to the libraries listed below
Sorting:
- A list of questions that can be asked during an interview for a cloud architect position.☆11Nov 27, 2021Updated 4 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- AWS CloudTrail CloudFormation template which creates KMS encryption keys, an encrypted S3 bucket, and enables CloudTrail☆14May 26, 2024Updated last year
- Configure AWS accounts for CloudTrail, Root Account Usage Monitor.☆13Aug 24, 2015Updated 10 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Jul 23, 2021Updated 4 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- AWS Cloudtrail event alerting lambda function. Send alerts to Slack, Email, or SNS.☆20Apr 13, 2023Updated 2 years ago
- Manage GuardDuty At Enterprise Scale☆22Sep 17, 2020Updated 5 years ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- ☆83Dec 5, 2019Updated 6 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- Automate the daily partitioning of your CloudTrail bucket in Athena☆28Oct 19, 2023Updated 2 years ago
- bash script to enable Amazon Inspector2 on AWS Organizations in multiple regions☆40Sep 4, 2025Updated 6 months ago
- ☆22May 11, 2022Updated 3 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 5 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- GitHub action for validating Microsoft Sentinel detection rules☆14May 22, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- AWS Penetration Testing, published by Packt☆33Jan 18, 2023Updated 3 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆206Feb 16, 2021Updated 5 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆608Nov 28, 2024Updated last year
- ☆15Jan 11, 2024Updated 2 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Built-in Panther detection rules and policies☆441Mar 13, 2026Updated last week
- Matos is an open-source cloud security tool for analyzing multi-cloud infrastructure security.☆17Feb 16, 2023Updated 3 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago