wiz-sec-public / cloud-middleware-datasetView external linksLinks
☆245Jul 9, 2024Updated last year
Alternatives and similar repositories for cloud-middleware-dataset
Users that are interested in cloud-middleware-dataset are comparing it to the libraries listed below
Sorting:
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆374Sep 19, 2025Updated 4 months ago
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆256May 7, 2020Updated 5 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,507Updated this week
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- boostsecurityio/lotp☆138Jan 25, 2026Updated 2 weeks ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆602Nov 28, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆726Sep 17, 2025Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,420Jan 20, 2026Updated 3 weeks ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆647Nov 21, 2019Updated 6 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- ☆29Jan 31, 2025Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Mar 21, 2025Updated 10 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Feb 8, 2026Updated last week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Jan 28, 2025Updated last year
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆749Dec 19, 2023Updated 2 years ago
- all paths lead to clouds☆638Oct 11, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,539Aug 2, 2024Updated last year
- A repository of breaches of AWS customers☆794Jan 24, 2026Updated 3 weeks ago
- ☆127Jul 10, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated this week
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- ☆18Jan 31, 2025Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year