Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
☆1,917Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for Awesome-CloudSec-Labs
Users that are interested in Awesome-CloudSec-Labs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,524Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,993May 20, 2025Updated 10 months ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,187Dec 27, 2023Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆438Feb 16, 2026Updated last month
- Automating situational awareness for cloud penetration tests.☆2,327Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated 3 weeks ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆920Oct 30, 2024Updated last year
- game of active directory☆7,610Mar 12, 2026Updated 2 weeks ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,481Dec 31, 2025Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,286Updated this week
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated last month
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,535Jan 28, 2026Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,808Sep 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,377Mar 17, 2026Updated 2 weeks ago
- ☆616Jun 1, 2023Updated 2 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆631Mar 21, 2025Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,602Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,938Updated this week
- OSWE, OSEP, OSED, OSEE☆3,795Jan 2, 2026Updated 2 months ago
- Azure Security Resources and Notes☆1,721Feb 17, 2026Updated last month
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,110Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,901Oct 29, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆554Mar 12, 2026Updated 2 weeks ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,267Updated this week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,567Feb 5, 2026Updated last month
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆820Mar 6, 2026Updated 3 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Sep 4, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,549Jan 18, 2026Updated 2 months ago
- A collection of scripts for assessing Microsoft Azure security☆2,338Mar 15, 2026Updated 2 weeks ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,692Jan 8, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A repository of breaches of AWS customers☆800Mar 11, 2026Updated 2 weeks ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,213Jul 14, 2024Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆791Oct 29, 2022Updated 3 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,541Jan 5, 2026Updated 2 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,268Apr 12, 2024Updated last year
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,458Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,179Mar 28, 2025Updated last year