A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud
☆147May 24, 2022Updated 3 years ago
Alternatives and similar repositories for cloud-penetration-testing
Users that are interested in cloud-penetration-testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cloud Pentesting Resource Collection☆35Jan 10, 2024Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆56Mar 7, 2022Updated 4 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 2 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆348Mar 4, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Jan 24, 2023Updated 3 years ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,186Dec 27, 2023Updated 2 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- Awesome list for cloud security related projects☆150Oct 4, 2022Updated 3 years ago
- ☆757Aug 26, 2022Updated 3 years ago
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆295Jul 21, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆919Oct 30, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆244Jan 23, 2025Updated last year
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- ☆35Nov 14, 2024Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last month
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Jul 4, 2024Updated last year
- Azure and AWS Attacks☆1,113Nov 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆736Mar 19, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- ☆33Aug 25, 2021Updated 4 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Simple website to guess API Key / OAuth Token☆48Aug 29, 2022Updated 3 years ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,917Oct 1, 2025Updated 5 months ago
- ☆19Apr 28, 2025Updated 10 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆220Jan 18, 2023Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year
- ☆20May 18, 2022Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,110Updated this week
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago