• Stars
    star
    110
  • Rank 308,313 (Top 7 %)
  • Language
  • License
    GNU General Publi...
  • Created about 3 years ago
  • Updated about 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google

Awesome Cloud Security

βš”οΈπŸ›‘οΈβš”οΈ Awesome curated list of cloud security resources including relevant penetration testing tools for Cloud Security

Contents

Standards

Compliances

Benchmarks

Tools

Infrastrcture

  • aws_pwn: A collection of AWS penetration testing junk
  • aws_ir: Python installable command line utility for mitigation of instance and key compromises.
  • aws-vault: A vault for securely storing and accessing AWS credentials in development environments.
  • awspx: A graph-based tool for visualizing effective access and resource relationships within AWS.
  • azucar: A security auditing tool for Azure environments
  • checkov: A static code analysis tool for infrastructure-as-code.
  • CloudBrute: A multiple cloud enumerator.
  • cloud-forensics-utils: A python lib for DF & IR on the cloud.
  • cloudlist: Listing Assets from multiple Cloud Providers.
  • cloudgoat: "Vulnerable by Design" AWS deployment tool.
  • Cloudmapper: Analyze your AWS environments.
  • cloudsplaining: An AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
  • Cloudsploit Scans: Cloud security configuration checks.
  • Cloud-custodian: Rules engine for cloud security, cost optimization, and governance.
  • cs suite: Tool for auditing the security posture of AWS/GCP/Azure.
  • diffy: Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix.
  • ElectricEye: Continuously monitor AWS services for configurations.
  • Forseti security: GCP inventory monitoring and policy enforcement tool.
  • Hammer: A multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS resources.
  • kics: Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code.
  • Leonidas: A framework for executing attacker actions in the cloud.
  • Open policy agent: Policy-based control tool.
  • pacbot: Policy as Code Bot.
  • pacu: The AWS exploitation framework.
  • Prowler: Command line tool for AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool.
  • ScoutSuite: Multi-cloud security auditing tool.
  • Security Monkey: Monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
  • SkyArk: Tool to helps to discover, assess and secure the most privileged entities in Azure and AWS.
  • SkyWrapper: Tool helps to discover suspicious creation forms and uses of temporary tokens in AWS.
  • Smogcloud: Find cloud assets that no one wants exposed.
  • TerraGoat: Bridgecrew's "Vulnerable by Design" Terraform repository.
  • Terrascan: Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
  • tfsec: Static analysis powered security scanner for Terraform code.
  • Zeus: AWS Auditing & Hardening Tool.

Container

  • auditkube: Audit for for EKS, AKS and GKE for HIPAA/PCI/SOC2 compliance and cloud security.
  • ccat: Cloud Container Attack Tool.
  • Falco: Container runtime security.
  • mkit: Managed kubernetes inspection tool.
  • Open policy agent: Policy-based control tool.

SaaS

Native tools

Penetration Testing

Enumeration

  • o365creeper - Enumerate valid email addresses
  • CloudBrute - Tool to find a cloud infrastructure of a company on top Cloud providers
  • cloud_enum - Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud
  • Azucar - Security auditing tool for Azure environments
  • CrowdStrike Reporting Tool for Azure (CRT) - Query Azure AD/O365 tenants for hard to find permissions and configuration settings
  • ScoutSuite - Multi-cloud security auditing tool. Security posture assessment of different cloud environments.
  • BlobHunter - A tool for scanning Azure blob storage accounts for publicly opened blobs
  • Grayhat Warfare - Open Azure blobs and AWS bucket search

Information Gathering

  • o365recon - Information gathering with valid credentials to Azure
  • Get-MsolRolesAndMembers.ps1 - Retrieve list of roles and associated role members
  • ROADtools - Framework to interact with Azure AD
  • PowerZure - PowerShell framework to assess Azure security
  • Azurite - Enumeration and reconnaissance activities in the Microsoft Azure Cloud
  • Sparrow.ps1 - Helps to detect possible compromised accounts and applications in the Azure/M365 environment
  • Hawk - Powershell based tool for gathering information related to O365 intrusions and potential breaches

Lateral Movement

  • Stormspotter - Azure Red Team tool for graphing Azure and Azure Active Directory objects
  • AzureADLateralMovement - Lateral Movement graph for Azure Active Directory
  • SkyArk - Discover, assess and secure the most privileged entities in Azure and AWS

Exploitation

Credential Attacks

  • MSOLSpray - A password spraying tool for Microsoft Online accounts (Azure/O365)
  • MFASweep - A tool for checking if MFA is enabled on multiple Microsoft Services Resources
  • adconnectdump - Dump Azure AD Connect credentials for Azure AD and Active Directory

Reading Materials

AWS

Azure

GCP

Others

Resources

Lists and Cheat Sheets

Lab Exercises

Talks and Videos

Books

Tips and Tricks

  • Replace COMPANYNAME with the company name of your choice to check if they use Azure. If the NameSpaceType indicates "Managed", then the company is using Azure AD:
https://login.microsoftonline.com/[email protected]&xml=1