Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

awesome-cloud-sec

Awesome list for cloud security related projects
https://github.com/RyanJarv/awesome-cloud-sec

Last synced: 1 day ago
JSON representation

  • Other Awesome Lists

    • Subdomain Takeover

      • takeover - - Sub-Domain TakeOver Vulnerability Scanner
      • ScoutSuite - - Multi-Cloud Security Auditing Tool
      • security-cloud-scout - - Cross-Cloud AWS/Azure
      • subdover - - Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3
      • can-i-take-over-xyz - - "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
      • SubOver - - A Powerful Subdomain Takeover Tool
      • kube-hunter - - Hunt for security weaknesses in Kubernetes clusters
      • kubeaudit - - kubeaudit helps you audit your Kubernetes clusters against common security controls
      • kubiscan - - A tool to scan Kubernetes cluster for risky permissions
      • kubesploit - - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
      • kubernetes-rbac-audit - - Tool for auditing RBACs in Kubernetes
      • peirates - - Peirates - Kubernetes Penetration Testing tool
      • GCP-IAM-Privilege-Escalation - - A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.
      • CRT - - This tool queries the following configurations in the Azure AD/O365 tenant which can shed light on hard to find permissions and configuration settings in order to assist organizations in securing these environments.
      • cheatsheet - - Kubernetes Cheat Sheet – 15 Kubectl Commands & Objects
      • pydevops - - gcp gcloud cheat sheet
      • how to applied purple teaming lab build on azure with terraform
      • cloudjack - - Route53/CloudFront Vulnerability Assessment Utility
      • gcp_k8s_enum - - Enumerate services exposed via GKE.
    • Offensive Security

      • pacu - - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
      • aws_pwn - - A collection of AWS penetration testing junk.
      • IAMFinder - - Enumerates and finds users and IAM roles in a target AWS account.
      • enumerate-iam - - Brute force enumeration of permissions associated with AWS credential set.
      • WeirdAAL - - WeirdAAL (AWS Attack Library)
      • marionett - - Example of how an attacker might swap user data temporarily to execute arbitrary commands.
      • liquidswards - - Discover and maintain access to IAM roles.
      • endgame - - An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
      • marionett - - Example of how an attacker might swap user data temporarily to execute arbitrary commands.
    • Infrastructure as Code (IaC)

      • former2 - - Generate CloudFormation / Terraform / Troposphere templates from your existing AWS resources.
    • General Utilities

      • coldsnap - - A command line interface for Amazon EBS snapshots
      • lsh - - Run interactive shell commands on AWS Lambda
      • dsnap - - Utility for downloading and mounting EBS snapshots using the EBS Direct API's
      • cognitocurl - - 🦉🤖Easily sign curl calls to API Gateway with Cognito authorization token.
      • PMapper - - A tool for quickly evaluating IAM permissions in AWS.
      • aws_public_ips - - Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services
      • awspx - - Graph-based tool for visualizing effective access and resource relationships.
    • Resource DBs

      • introspector - - A schema and set of tools for using SQL to query cloud infrastructure
      • cartography - - Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
      • cloudquery - - cloudquery transforms your cloud infrastructure into SQL or Graph database for easy monitoring, governance and security.
      • steampipe - - The extensible SQL interface to your favorite cloud APIs.
    • Visual Resource Graphing

      • cloudsplaining - - Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
      • cloudiscovery - - Discover resources in the cloud environment.
      • cloudmapper - - Analyze your Amazon Web Services (AWS) environments
      • hammer - - Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)
    • Linting/Static Analysis

    • Auditing

      • rpCheckup - - rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
      • prowler - - Best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness.
      • cloudsploit - - Cloud Security Posture Management (CSPM)
      • smogcloud - - Find cloud assets that no one wants exposed 🔎 ☁️
      • AWS Config - - Lambda's that analyze resource state and changes, primarily in AWS but extensible
    • Least privilege

      • policy_sentry - - IAM Least Privilege Policy Generator.
      • repokid - - IAM least privilege service
      • cloudtracker - - Finds over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
      • iamlive - - Generate a basic IAM policy from AWS client-side monitoring (CSM)
      • aws-leastprivilege - - Generates an IAM policy for the CloudFormation service role that adheres to least privilege.
    • Vulnerable by design

      • cloudgoat - - CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
      • terragoat - - TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository.
    • SAML

      • shimit - - A tool that implements the Golden SAML attack
    • DNS

      • subfinder - - Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
    • Subdomain Enumeration

      • ctfr - - Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
    • Secret Scanning

    • Terraform

      • checkov - - Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
      • terrascan
      • KaiMonkey
      • tfsec - - Security scanner for your Terraform code
      • kics - - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
      • AirIAM - - Least privilege AWS IAM Terraformer.
      • terraform_aws_scp - - AWS Organizations Service Control Policies (SCPs) for Terraform.
      • KaiMonkey
      • terraformer - - CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code
    • Containers

      • deepce - - Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE).
      • ccat - - Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
      • trivy - - Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
      • deepce - - Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE).
    • Open Policy Agent (OPA)

      • opa - - An open source, general-purpose policy engine.
      • fregot - - Alternative REPL to OPA's built-in interpreter.
      • policy-hub-cli - - CLI for searching Rego policies
      • conftest - - Write tests against structured configuration data using the Open Policy Agent Rego query language
    • Misc

    • Non-CloudSec Stuff (TODO: move this elsewhere)

      • proxify - - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
      • CloudFail - - Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network.
      • chalice - - Python Serverless Microframework for AWS
      • placebo - - Make boto3 calls that look real but have no effect.
      • serverlessish - - Run the same Docker images in AWS Lambda and AWS ECS
      • BloodHound - - Six Degrees of Domain Admin
      • ProcMon-for-Linux - - Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscall activity on the system.
      • exec-template - - Super simple go templater.
      • leapp - - Potential alternative to aws-vault