Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach
☆158Mar 20, 2026Updated last month
Alternatives and similar repositories for threatmodel-for-aws-s3
Users that are interested in threatmodel-for-aws-s3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Mar 20, 2026Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆272Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆285Nov 27, 2025Updated 4 months ago
- ☆1,053Apr 12, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆46Nov 7, 2024Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆49Jun 13, 2023Updated 2 years ago
- Fun tools around the EBS Direct API☆20Apr 16, 2021Updated 5 years ago
- ☆30Jan 13, 2026Updated 3 months ago
- List of known AWS accounts☆257Apr 2, 2026Updated 2 weeks ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆700Updated this week
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆273Apr 12, 2026Updated last week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Apr 3, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆599Apr 8, 2026Updated last week
- ☆16Jul 17, 2024Updated last year
- OWASP Domain Protect - prevent subdomain takeover☆396Dec 23, 2024Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆182Oct 9, 2025Updated 6 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 5 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A repository of breaches of AWS customers☆803Mar 30, 2026Updated 3 weeks ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆927Jul 25, 2019Updated 6 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- Search exposed EBS volumes for secrets☆301Apr 24, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Force CloudFormation to generate a tree view for any stack☆18Sep 14, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,128Mar 10, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆649Nov 21, 2019Updated 6 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- ☆376Feb 23, 2024Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆769Oct 14, 2023Updated 2 years ago
- Open Cloud Security Posture Management Engine☆347Feb 19, 2022Updated 4 years ago