opendevsecops / guide-aws-hacking
This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaknesses you will be verse enough to provide the correct countermeasures.
☆171Updated 6 years ago
Alternatives and similar repositories for guide-aws-hacking:
Users that are interested in guide-aws-hacking are comparing it to the libraries listed below
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year
- Cloud-related research releases from the Rhino Security Labs team.☆386Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆130Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆354Updated 4 years ago
- Damn Vulnerable Cloud Application☆193Updated 6 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- AWS S3 Bucket/Object Finder☆119Updated 3 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆247Updated this week
- 🏰 A Python script for AWS S3 bucket enumeration.☆142Updated 2 years ago
- Amazon bucket brute force tool☆99Updated 11 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆517Updated last year
- Search exposed EBS volumes for secrets☆298Updated 2 years ago
- ☆275Updated 3 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆204Updated 6 months ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 2 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- ☆248Updated 10 months ago
- Pentesting/Bugbounty Dockerfiles.☆176Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆344Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Red Team Scripts for AWS.☆168Updated 4 years ago
- barq: The AWS Cloud Post Exploitation framework!☆386Updated 2 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago