Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for amazon web services cloud security
amazon-web-services
x
cloud-security
x
0 search results found
Terrascan
⭐
4,500
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Consoleme
⭐
3,025
A Central Control Plane for AWS Permissions and Access
Cf
⭐
2,077
Cloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作
Policy_sentry
⭐
1,906
IAM Least Privilege Policy Generator
Cloudsplaining
⭐
1,840
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
Cloudfox
⭐
1,681
Automating situational awareness for cloud penetration tests.
Awesome Cloud Security
⭐
1,549
🛡️ Awesome Cloud Security Resources ⚔️
Stratus Red Team
⭐
1,539
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Hackingthe.cloud
⭐
1,410
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Pmapper
⭐
1,290
A tool for quickly evaluating IAM permissions in AWS.
Matano
⭐
1,259
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
Cloud Devops Learning Resources
⭐
1,153
This repo includes Books and imp notes related to GCP, Azure, AWS, Docker, K8s, and DevOps. More, exam and interview prep notes.
Pacbot
⭐
1,104
PacBot (Policy as Code Bot)
Terragoat
⭐
1,071
TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Awesome Aws Security
⭐
878
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Electriceye
⭐
794
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
Granted
⭐
791
The easiest way to access your cloud.
Skyark
⭐
725
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Cloud Security Remediation Guides
⭐
671
Security Remediation Guides
Zeuscloud
⭐
628
Open Source Cloud Security
Awesome Cloud Security
⭐
527
A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
Smogcloud
⭐
299
Find cloud assets that no one wants exposed 🔎 ☁️
Vajra
⭐
292
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfaces.
Tfquery
⭐
277
tfquery: Run SQL queries on your Terraform infrastructure. Query resources and analyze its configuration using a SQL-powered framework.
Awskeytools
⭐
241
AWS云平台 AccessKey 泄漏利用工具
Cloudgrep
⭐
240
cloudgrep is grep for cloud storage
Hammer
⭐
234
Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)
Varc
⭐
210
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
Aws Allowlister
⭐
208
Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
Iamzero
⭐
168
Identity & Access Management simplified and secure.
Magpie
⭐
147
A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat landscape such as cloud ransomware and supply chain attacks.
Nuvola
⭐
134
Cloudfrontier
⭐
110
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Rpcheckup
⭐
108
rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Metabadger
⭐
93
Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
Derf
⭐
67
DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
Cfngoat
⭐
64
Cfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Introspector
⭐
52
A schema and set of tools for using SQL to query cloud infrastructure.
Cfsec
⭐
51
Static analysis for CloudFormation templates to identify common misconfiguration
Awsxenos
⭐
45
AWSXenos will list all the trust relationships in all the IAM roles and S3 buckets
Sgcheckup
⭐
40
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Cdkgoat
⭐
34
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Eks Creation Engine
⭐
33
The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the CISO to facilitate the creation and enablement of secure EKS Clusters.
Gdpatrol
⭐
31
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Cloudsec Tidbits
⭐
25
Blogpost series showcasing interesting cloud - web app security bugs
Terraform Provider Policyguru
⭐
23
Terraform provider for Policy Sentry (IAM least privilege generator and auditor)
Cloudandcontainercompromisesimulator
⭐
21
Simulates a compromise in a cloud and container environment
Cybercloudlearning
⭐
17
Repo for Cybercloud Tutorials hosted at cybercloud.guru
Awsrecon
⭐
11
Tool for reconnaissance of AWS cloud environments
Aws Sec Tools
⭐
10
Docker container bundling tools for manual AWS security reviews
Hawk
⭐
8
Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage
Aws Kms Tour
⭐
7
AWS KMS Tour for secrets code
Aws Compliancemachinedontstop
⭐
6
Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Account Security Posture.
Lacework Control Tower Cfn
⭐
6
AWS Control Tower and Lacework allow seamless multi-account cloud security. With Lacework and AWS Control Tower, enrolling a new AWS account now means security best practices and monitoring are automatically applied consistently across your organization. Account administrators can automatically add Lacework's security auditing and monitoring to new AWS accounts. All the required Lacework and AWS account configurations that allow access to AWS configuration and AWS CloudTrail logs are managed for
Aws Iam Credential Report
⭐
6
AWS CloudFormation templates and Python code for AWS blog post on how to automate IAM credential reports at scale across AWS.
Secure_ec2
⭐
6
CLI tool that helps you to provision EC2 instances securely
Awesome Aws Security
⭐
6
A carefully curated list of open source projects aimed at improving your AWS security posture!
Aws Sso Steampipe Tool
⭐
6
Generate AWS CLI Profiles from AWS SSO & Steampipe (AWS) Connections Quickly
Awsecure Cli
⭐
6
An AWS CLI wrapper that enables, transparently, AWS Access Keys auto-rotation, MFA, and encrypted AWS credentials file.
Cloud Custodian Aws Policies
⭐
6
CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources
Terraform Aws Ebs Snapshot Publicly Exposed
⭐
5
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
Attacking Cloudgoat2
⭐
5
A step-by-step walkthrough of CloudGoat 2.0 scenarios.
1-0 of 0 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.