hashishrajan / cloud-security-vulnerabilitiesLinks
List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Oracle Cloud, IBM Cloud etc
☆371Updated 2 years ago
Alternatives and similar repositories for cloud-security-vulnerabilities
Users that are interested in cloud-security-vulnerabilities are comparing it to the libraries listed below
Sorting:
- ☆423Updated 3 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆373Updated 4 months ago
- Security Remediation Guides☆744Updated 2 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆126Updated 4 years ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆292Updated last year
- ☆246Updated last year
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Updated 3 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆727Updated 3 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆428Updated last year
- Awesome list for cloud security related projects☆149Updated 3 years ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆655Updated 8 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated 3 weeks ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆542Updated 4 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆286Updated 3 years ago
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- Azure and AWS Attacks☆1,112Updated 3 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆411Updated 3 months ago
- Threat matrix for CI/CD Pipeline☆760Updated last year
- A curated list of Awesome Security Challenges.☆211Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆400Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆479Updated 7 months ago
- ☆136Updated 3 years ago
- My cheatsheet notes to pentest AWS infrastructure☆703Updated 3 years ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆430Updated last month
- Watch the latest awesome security talks around the globe☆279Updated 11 months ago
- OWASP Code Review Guide Web Repository☆148Updated 3 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆912Updated last year