hashishrajan / cloud-security-vulnerabilitiesLinks
List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Oracle Cloud, IBM Cloud etc
☆370Updated 2 years ago
Alternatives and similar repositories for cloud-security-vulnerabilities
Users that are interested in cloud-security-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆127Updated 4 years ago
- ☆419Updated 2 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆368Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆288Updated last year
- Security Remediation Guides☆741Updated last month
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆417Updated last year
- ☆244Updated last year
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆653Updated 5 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆303Updated 2 years ago
- Awesome list for cloud security related projects☆140Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆289Updated 3 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆388Updated 10 months ago
- This repo has been replaced by https://www.cloudvulndb.org☆725Updated 3 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆522Updated 2 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆447Updated 2 months ago
- An AWS IAM policy statement parser and query tool.☆195Updated 4 months ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 5 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆405Updated last month
- A curated list of Awesome Security Challenges.☆197Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆403Updated 2 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆74Updated last month
- Watch the latest awesome security talks around the globe☆277Updated 8 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- My cheatsheet notes to pentest AWS infrastructure☆693Updated 3 years ago
- Azure and AWS Attacks☆1,110Updated 2 years ago
- OWASP Code Review Guide Web Repository☆145Updated 3 years ago
- Threat matrix for CI/CD Pipeline☆758Updated last year
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆176Updated 2 weeks ago