aws
Tool for obfuscating and deobfuscating data.
Nuke a whole AWS account and delete all its resources.
Convert cloudtrail data to MITRE ATT&CK Sightings
Example policies demonstrating how to implement a data perimeter on AWS.
An AWS metadata enumeration tool by Plerion
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.
Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.
Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. CloudTrail logs) and mapping them to the original user input a…
A Golang program to rotate AWS & GCP account keys
A mostly-serverless distributed hash cracking platform
A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices
Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for precise detection and notification specifically for honeyservic…
A tool to uncover undocumented APIs from the AWS Console.
A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.
Halberd : Multi-Cloud Agentic Attack Tool
Open-source best practices for protecting a secure, sensible cloud platform
Cloud cost estimates for Terraform in pull requests💰📉 Shift FinOps Left!