A repository of breaches of AWS customers
☆802Mar 30, 2026Updated 2 weeks ago
Alternatives and similar repositories for aws-customer-security-incidents
Users that are interested in aws-customer-security-incidents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Granular, Actionable Adversary Emulation for the Cloud☆2,292Apr 9, 2026Updated last week
- ☆376Feb 23, 2024Updated 2 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- List of known AWS accounts☆257Apr 2, 2026Updated 2 weeks ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆654Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,202Apr 11, 2026Updated last week
- ☆1,054Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,625Apr 6, 2026Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- Automating situational awareness for cloud penetration tests.☆2,340Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆400Sep 25, 2023Updated 2 years ago
- ☆231Mar 27, 2026Updated 3 weeks ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,541Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆562Mar 12, 2026Updated last month
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,136Mar 30, 2026Updated 2 weeks ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆384Sep 19, 2025Updated 7 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆599Apr 8, 2026Updated last week
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,933Oct 1, 2025Updated 6 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 11 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,431Oct 16, 2025Updated 6 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆421Jan 7, 2026Updated 3 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,002Oct 4, 2022Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- cloudgrep is grep for cloud storage☆328Mar 14, 2026Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆408Sep 2, 2023Updated 2 years ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 4 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆700Updated this week
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆769Oct 14, 2023Updated 2 years ago
- A toolset to juggle AWS roles for persistent access☆62Aug 14, 2024Updated last year
- A command-line tool to get valuable information out of AWS CloudTrail☆833Updated this week