opendevsecops / guide-aws-hacking
This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaknesses you will be verse enough to provide the correct countermeasures.
☆171Updated 6 years ago
Alternatives and similar repositories for guide-aws-hacking:
Users that are interested in guide-aws-hacking are comparing it to the libraries listed below
- Search exposed EBS volumes for secrets☆297Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆381Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- AWS S3 Bucket/Object Finder☆118Updated 3 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆338Updated 4 years ago
- ☆275Updated 3 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆131Updated 2 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆141Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆350Updated 4 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆508Updated last year
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- ☆244Updated 8 months ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆243Updated last week
- A place to store my own wordlists, and link to others that are useful☆106Updated last year
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…