Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach
☆157Mar 20, 2026Updated last week
Alternatives and similar repositories for threatmodel-for-aws-s3
Users that are interested in threatmodel-for-aws-s3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Mar 20, 2026Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆273Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 4 months ago
- ☆1,052Aug 22, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Blogpost series showcasing interesting cloud - web app security bugs☆49Jun 13, 2023Updated 2 years ago
- ☆46Nov 7, 2024Updated last year
- Fun tools around the EBS Direct API☆20Apr 16, 2021Updated 4 years ago
- ☆30Jan 13, 2026Updated 2 months ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆693Updated this week
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Mar 22, 2026Updated last week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Apr 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆597Mar 10, 2026Updated 2 weeks ago
- ☆16Jul 17, 2024Updated last year
- OWASP Domain Protect - prevent subdomain takeover☆397Dec 23, 2024Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 5 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆611Nov 28, 2024Updated last year
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 5 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A repository of breaches of AWS customers☆798Mar 11, 2026Updated 2 weeks ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆925Jul 25, 2019Updated 6 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Force CloudFormation to generate a tree view for any stack☆18Sep 14, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,127Mar 10, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆761Oct 14, 2023Updated 2 years ago
- Open Cloud Security Posture Management Engine☆346Feb 19, 2022Updated 4 years ago