A repository of breaches of AWS customers
☆795Jan 24, 2026Updated last month
Alternatives and similar repositories for aws-customer-security-incidents
Users that are interested in aws-customer-security-incidents are comparing it to the libraries listed below
Sorting:
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Mar 1, 2026Updated last week
- ☆375Feb 23, 2024Updated 2 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆726Jun 29, 2022Updated 3 years ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,185Mar 1, 2026Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,532Feb 10, 2026Updated 3 weeks ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- ☆1,050Aug 22, 2025Updated 6 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated 2 weeks ago
- ☆401Sep 25, 2023Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,299Mar 2, 2026Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,490Feb 12, 2026Updated 3 weeks ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆592Nov 12, 2025Updated 3 months ago
- ☆229Feb 24, 2026Updated last week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,080Feb 24, 2026Updated last week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,889Oct 1, 2025Updated 5 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆375Sep 19, 2025Updated 5 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆405Sep 2, 2023Updated 2 years ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆513May 15, 2025Updated 9 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆605Nov 28, 2024Updated last year
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,411Oct 16, 2025Updated 4 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆755Oct 14, 2023Updated 2 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆995Oct 4, 2022Updated 3 years ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated last year
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆683Updated this week
- Monitor AWS Managed IAM Policies Changes☆493Updated this week
- A command-line tool to get valuable information out of AWS CloudTrail☆830Mar 2, 2026Updated last week
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago