Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic
☆307Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for AWS-Threat-Simulation-and-Detection
Users that are interested in AWS-Threat-Simulation-and-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Granular, Actionable Adversary Emulation for the Cloud☆2,295Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- A dataset with CloudTrail events from an attack simulation using Stratus.☆25Jul 12, 2023Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,136Mar 30, 2026Updated 2 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Azure Security Resources and Notes☆1,734Feb 17, 2026Updated 2 months ago
- Deploy customizable Active Directory labs in Azure - automatically.☆427Dec 5, 2024Updated last year
- ☆615Jun 1, 2023Updated 2 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆636Mar 21, 2025Updated last year
- Hunting queries and detections☆894Oct 30, 2025Updated 5 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆599Apr 8, 2026Updated last week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆562Mar 12, 2026Updated last month
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated last month
- Automating situational awareness for cloud penetration tests.☆2,340Apr 12, 2026Updated last week
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Bloodhound Portable for Windows☆54Apr 1, 2023Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆220Apr 1, 2026Updated 2 weeks ago
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated 2 weeks ago
- ☆400Sep 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of resources about detecting threats and defending Kubernetes systems.☆408Sep 2, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,636Apr 6, 2026Updated last week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,000May 20, 2025Updated 10 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆664Jun 14, 2023Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,541Updated this week
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,564Apr 3, 2026Updated 2 weeks ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,378Mar 9, 2026Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,808Apr 6, 2026Updated last week
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,407Nov 7, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago