This repo contains IOC, malware and malware analysis associated with Public cloud
☆249Nov 11, 2024Updated last year
Alternatives and similar repositories for CloudIntel
Users that are interested in CloudIntel are comparing it to the libraries listed below
Sorting:
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- ☆124May 26, 2025Updated 9 months ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- ☆14Jan 8, 2026Updated last month
- AWS honey token manager☆89Aug 1, 2024Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,266Feb 13, 2026Updated 2 weeks ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- ☆18Jul 30, 2024Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆65May 21, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,881Oct 1, 2025Updated 4 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,975May 20, 2025Updated 9 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated last month
- GitHub Actions Pipeline Enumeration and Attack Tool☆730Sep 17, 2025Updated 5 months ago
- ☆23Sep 20, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Dec 29, 2023Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆261Dec 5, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆752Oct 14, 2023Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- ☆75Mar 19, 2025Updated 11 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆605Nov 28, 2024Updated last year