paulveillard / cybersecurity-aws-tools
An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals
☆22Updated 3 years ago
Alternatives and similar repositories for cybersecurity-aws-tools:
Users that are interested in cybersecurity-aws-tools are comparing it to the libraries listed below
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆51Updated 2 years ago
- ☆38Updated last year
- Updated incident response generator for training classes☆43Updated 3 years ago
- Generates runbooks for GuardDuty findings☆35Updated 7 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆37Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated 5 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- ☆26Updated 3 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆30Updated 2 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆15Updated 11 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 3 months ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year
- Offensive Terraform Website☆44Updated 4 years ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- ☆12Updated 3 months ago
- https://breaches.cloud☆38Updated 4 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆48Updated 3 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 11 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- ☆28Updated 3 months ago
- ☆38Updated 10 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 4 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- ☆55Updated last year
- ☆31Updated 3 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year