Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
☆1,953Oct 1, 2025Updated 7 months ago
Alternatives and similar repositories for Awesome-CloudSec-Labs
Users that are interested in Awesome-CloudSec-Labs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,561Apr 28, 2026Updated last week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,009May 20, 2025Updated 11 months ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,197Dec 27, 2023Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆443May 1, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,370Apr 21, 2026Updated 2 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated 2 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆935Oct 30, 2024Updated last year
- game of active directory☆7,771Mar 12, 2026Updated last month
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,514Apr 20, 2026Updated 2 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,315Updated this week
- Azure and AWS Attacks☆1,119Nov 25, 2022Updated 3 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,556Apr 3, 2026Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,409Mar 17, 2026Updated last month
- ☆615Jun 1, 2023Updated 2 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆641Mar 21, 2025Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,652Apr 6, 2026Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,951Apr 28, 2026Updated last week
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- Azure Security Resources and Notes☆1,741Feb 17, 2026Updated 2 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,166Apr 27, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆566Mar 12, 2026Updated last month
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,281Apr 9, 2026Updated last month
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,604Feb 5, 2026Updated 3 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 3 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,603Jan 18, 2026Updated 3 months ago
- A collection of scripts for assessing Microsoft Azure security☆2,376Mar 15, 2026Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆295Sep 4, 2024Updated last year
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,701Jan 8, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated last month
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,227Jul 14, 2024Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Oct 29, 2022Updated 3 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,580Jan 5, 2026Updated 4 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,290Apr 12, 2024Updated 2 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,626Apr 16, 2026Updated 3 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year