hashishrajan / cloud-security-vulnerabilitiesLinks
List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Oracle Cloud, IBM Cloud etc
☆367Updated 2 years ago
Alternatives and similar repositories for cloud-security-vulnerabilities
Users that are interested in cloud-security-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- ☆418Updated 2 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆349Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆286Updated 11 months ago
- Security Remediation Guides☆737Updated last week
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆643Updated 3 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆299Updated 2 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆726Updated 3 years ago
- ☆243Updated last year
- Awesome list for cloud security related projects☆131Updated 2 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆406Updated 9 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆194Updated last month
- Azure and AWS Attacks☆1,103Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆443Updated last week
- Threat matrix for CI/CD Pipeline☆757Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆514Updated last year
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆372Updated 7 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆397Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆70Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- My cheatsheet notes to pentest AWS infrastructure☆684Updated 2 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆871Updated 9 months ago
- A curated list of Awesome Security Challenges.☆194Updated 9 months ago
- Create your own vulnerable by design AWS penetration testing playground☆388Updated 4 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 9 months ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆450Updated 2 months ago