└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # awesome-cloud-sec 2 | Awesome list for cloud (mostly AWS at the moment), security, pentesting related projects and libraries. 3 | 4 | NOTE: This isn't an endorsement of any of these projects. I'm mostly using this as a way to keep track of interesting projects I come across. 5 | 6 | # AWS 7 | 8 | ### Info 9 | * [aws_exposable_resources](https://github.com/SummitRoute/aws_exposable_resources) -- Resource types that can be publicly exposed on AWS 10 | * [aws_managed_policies](https://github.com/z0ph/aws_managed_policies) -- [MAMIP] Monitor AWS Managed IAM Policies Changes 11 | * [Security Tool Comparison](https://summitroute.github.io/aws_research/security_tool_comparison.html) -- Comparisons between various security tools. 12 | * [aws-public-account-ids](https://github.com/rupertbg/aws-public-account-ids) -- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail. 13 | 14 | ## Other Awesome Lists 15 | * [toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools#other-interesting-toolscode) 16 | 17 | ### Offensive Security 18 | * [pacu](https://github.com/RhinoSecurityLabs/pacu) -- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. 19 | * [liquidswards](https://github.com/RyanJarv/liquidswards) -- Discover and maintain access to IAM roles. 20 | * [aws_pwn](https://github.com/dagrz/aws_pwn) -- A collection of AWS penetration testing junk. 21 | * [IAMFinder](https://github.com/prisma-cloud/IAMFinder) -- Enumerates and finds users and IAM roles in a target AWS account. 22 | * [enumerate-iam](https://github.com/andresriancho/enumerate-iam) -- Brute force enumeration of permissions associated with AWS credential set. 23 | * [endgame](https://github.com/brandongalbraith/endgame) -- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈 24 | * [WeirdAAL](https://github.com/carnal0wnage/weirdAAL) -- WeirdAAL (AWS Attack Library) 25 | * [marionett](https://github.com/RyanJarv/marionett) -- Example of how an attacker might swap user data temporarily to execute arbitrary commands. 26 | 27 | ### Infrastructure as Code (IaC) 28 | * [terraformer](https://github.com/GoogleCloudPlatform/terraformer) -- CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code 29 | * [former2](https://github.com/iann0036/former2) -- Generate CloudFormation / Terraform / Troposphere templates from your existing AWS resources. 30 | 31 | ### General Utilities 32 | * [coldsnap](https://github.com/awslabs/coldsnap) -- A command line interface for Amazon EBS snapshots 33 | * [lsh](https://github.com/tobilg/lsh) -- Run interactive shell commands on AWS Lambda 34 | * [dsnap](https://github.com/RhinoSecurityLabs/dsnap) -- Utility for downloading and mounting EBS snapshots using the EBS Direct API's 35 | * [cognitocurl](https://github.com/nordcloud/cognitocurl) -- 🦉🤖Easily sign curl calls to API Gateway with Cognito authorization token. 36 | * Offline Web Console's 37 | * [ScoutSuite](https://github.com/nccgroup/ScoutSuite) -- Multi-Cloud Security Auditing Tool 38 | * Resource analysis 39 | * [awspx](https://github.com/FSecureLABS/awspx) -- Graph-based tool for visualizing effective access and resource relationships. 40 | * [PMapper](https://github.com/nccgroup/PMapper) -- A tool for quickly evaluating IAM permissions in AWS. 41 | * [aws_public_ips](https://github.com/arkadiyt/aws_public_ips) -- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services 42 | * Fork that handles multiple regions: https://github.com/breser/aws_public_ips 43 | 44 | ### Resource DBs 45 | * [steampipe](https://steampipe.io/) -- The extensible SQL interface to your favorite cloud APIs. 46 | * [introspector](https://github.com/goldfiglabs/introspector) -- A schema and set of tools for using SQL to query cloud infrastructure 47 | * [cartography](https://github.com/lyft/cartography) -- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database. 48 | * [cloudquery](https://github.com/cloudquery/cloudquery) -- cloudquery transforms your cloud infrastructure into SQL or Graph database for easy monitoring, governance and security. 49 | 50 | ### Visual Resource Graphing 51 | * [cloudsplaining](https://github.com/salesforce/cloudsplaining) -- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. 52 | * [cloudiscovery](https://github.com/Cloud-Architects/cloudiscovery) -- Discover resources in the cloud environment. 53 | * [cloudmapper](https://github.com/duo-labs/cloudmapper) -- Analyze your Amazon Web Services (AWS) environments 54 | * Note: Takes advantage of existing botocore definitions for discovery. 55 | * [hammer](https://github.com/dowjones/hammer) -- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS) 56 | * [cloudscout](https://github.com/SygniaLabs/security-cloud-scout) -- Identify and visualize cross platform attack paths, vulnerabilities, and enhance overall resilience. 57 | 58 | ### Linting/Static Analysis 59 | * [parliament](https://github.com/duo-labs/parliament) -- AWS IAM linting library 60 | 61 | ### Auditing 62 | * [rpCheckup](https://github.com/goldfiglabs/rpCheckup) -- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources. 63 | * [prowler](https://github.com/toniblyx/prowler) -- Best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. 64 | * [AWS Config](https://aws.amazon.com/config/) -- Lambda's that analyze resource state and changes, primarily in AWS but extensible 65 | * [cloudsploit](https://github.com/aquasecurity/cloudsploit) -- Cloud Security Posture Management (CSPM) 66 | * [smogcloud](https://github.com/BishopFox/smogcloud) -- Find cloud assets that no one wants exposed 🔎 ☁️ 67 | 68 | ### Least privilege 69 | * [policy_sentry](https://github.com/salesforce/policy_sentry) -- IAM Least Privilege Policy Generator. 70 | * [repokid](https://github.com/Netflix/repokid) -- IAM least privilege service 71 | * [cloudtracker](https://github.com/duo-labs/cloudtracker) -- Finds over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies. 72 | * [iamlive](https://github.com/iann0036/iamlive) -- Generate a basic IAM policy from AWS client-side monitoring (CSM) 73 | * [aws-leastprivilege](https://github.com/iann0036/aws-leastprivilege) -- Generates an IAM policy for the CloudFormation service role that adheres to least privilege. 74 | 75 | ### Route53DB 76 | * [cloudjack](https://github.com/prevade/cloudjack) -- Route53/CloudFront Vulnerability Assessment Utility 77 | 78 | ### Vulnerable by design 79 | * [cloudgoat](https://github.com/RhinoSecurityLabs/cloudgoat) -- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool 80 | * [terragoat](https://github.com/bridgecrewio/terragoat) -- TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. 81 | ### SAML 82 | * [shimit](https://github.com/cyberark/shimit) -- A tool that implements the Golden SAML attack 83 | 84 | ### DNS 85 | * [subfinder](https://github.com/projectdiscovery/subfinder) -- Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. 86 | 87 | ### Subdomain Enumeration 88 | * [ctfr](https://github.com/UnaPibaGeek/ctfr) -- Abusing Certificate Transparency logs for getting HTTPS websites subdomains. 89 | 90 | ### Subdomain Takeover 91 | * [subdover](https://github.com/PushpenderIndia/subdover) -- Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3 92 | * [cloudjack](https://github.com/prevade/cloudjack) -- Route53/CloudFront Vulnerability Assessment Utility 93 | * [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) -- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. 94 | * [takeover](https://github.com/m4ll0k/takeover) -- Sub-Domain TakeOver Vulnerability Scanner 95 | * [SubOver](https://github.com/Ice3man543/SubOver) -- A Powerful Subdomain Takeover Tool 96 | 97 | # Kubernetes 98 | * [cheatsheet](https://kubernetes.io/docs/reference/kubectl/cheatsheet/) 99 | * [kube-hunter](https://github.com/aquasecurity/kube-hunter) -- Hunt for security weaknesses in Kubernetes clusters 100 | * [kubeaudit](https://github.com/Shopify/kubeaudit) -- kubeaudit helps you audit your Kubernetes clusters against common security controls 101 | * [kubiscan](https://github.com/cyberark/KubiScan) -- A tool to scan Kubernetes cluster for risky permissions 102 | * [kubesploit](https://github.com/cyberark/kubesploit) -- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments. 103 | * [kubernetes-rbac-audit](https://github.com/cyberark/kubernetes-rbac-audit) -- Tool for auditing RBACs in Kubernetes 104 | * [peirates](https://github.com/inguardians/peirates) -- Peirates - Kubernetes Penetration Testing tool 105 | * [cheatsheet](https://spacelift.io/blog/kubernetes-cheat-sheet) -- Kubernetes Cheat Sheet – 15 Kubectl Commands & Objects 106 | 107 | 108 | 109 | 110 | # GCP 111 | * [pydevops](https://gist.github.com/pydevops/cffbd3c694d599c6ca18342d3625af97) -- gcp gcloud cheat sheet 112 | * [GCP-IAM-Privilege-Escalation](https://github.com/RhinoSecurityLabs/GCP-IAM-Privilege-Escalation) -- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team. 113 | * [ScoutSuite](https://github.com/nccgroup/ScoutSuite) -- Multi-Cloud Security Auditing Tool 114 | * [terraformer](https://github.com/GoogleCloudPlatform/terraformer) -- CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code 115 | * [gcp_enum](https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/gcp_enum) -- A simple bash script to enumerate Google Cloud Platform environments. 116 | * [gcp_misc](https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/gcp_misc) -- Miscellaneous tools related to attack operations in Google Cloud Platform. 117 | * [gcp_firewall_enum](https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/gcp_firewall_enum) -- Parse gcloud output to enumerate compute instances with network ports exposed to the Internet. Generates targeted nmap and masscan scripts based on the results. 118 | * [gcp_k8s_enum](https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/gcp_k8s_enum) -- Enumerate services exposed via GKE. 119 | 120 | 121 | # Azure 122 | * [CRT](https://github.com/CrowdStrike/CRT) -- This tool queries the following configurations in the Azure AD/O365 tenant which can shed light on hard to find permissions and configuration settings in order to assist organizations in securing these environments. 123 | * [security-cloud-scout](https://github.com/SygniaLabs/security-cloud-scout) -- Cross-Cloud AWS/Azure 124 | * [how to applied purple teaming lab build on azure with terraform](https://www.blackhillsinfosec.com/how-to-applied-purple-teaming-lab-build-on-azure-with-terraform/) 125 | * [ScoutSuite](https://github.com/nccgroup/ScoutSuite) -- Multi-Cloud Security Auditing Tool 126 | 127 | # Other 128 | 129 | ### Secret Scanning 130 | * [DumpsterDiver](https://github.com/securing/DumpsterDiver) -- Tool to search secrets in various filetypes. 131 | * [ebs-direct-sec-tools](https://github.com/crypsisgroup/ebs-direct-sec-tools) -- Uses EBS Direct API to scan blocks for secrets 132 | 133 | ### Terraform 134 | * Terraform Static Analysis 135 | * [checkov](https://github.com/bridgecrewio/checkov) -- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew. 136 | * [terrascan](https://github.com/accurics/terrascan) 137 | * Related: [KaiMonkey](https://github.com/accurics/KaiMonkey) 138 | * [tfsec](https://github.com/aquasecurity/tfsec) -- Security scanner for your Terraform code 139 | * [kics](https://github.com/Checkmarx/kics) -- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx. 140 | * [AirIAM](https://github.com/bridgecrewio/AirIAM) -- Least privilege AWS IAM Terraformer. 141 | * [terraform_aws_scp](https://github.com/ScaleSec/terraform_aws_scp) -- AWS Organizations Service Control Policies (SCPs) for Terraform. 142 | * [terraformer](https://github.com/GoogleCloudPlatform/terraformer) -- CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code 143 | 144 | ### Containers 145 | * [deepce](https://github.com/stealthcopter/deepce/) -- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE). 146 | * [ccat](https://github.com/RhinoSecurityLabs/ccat) -- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments. 147 | * [trivy](https://github.com/aquasecurity/trivy) -- Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues 148 | 149 | ### Open Policy Agent (OPA) 150 | * [opa](https://github.com/open-policy-agent/opa) -- An open source, general-purpose policy engine. 151 | * [fregot](https://github.com/fugue/fregot) -- Alternative REPL to OPA's built-in interpreter. 152 | * [policy-hub-cli](https://github.com/policy-hub/policy-hub-cli) -- CLI for searching Rego policies 153 | * [conftest](https://github.com/open-policy-agent/conftest) -- Write tests against structured configuration data using the Open Policy Agent Rego query language 154 | 155 | ### Misc 156 | * [website-openid-proxy](https://github.com/wolfeidau/website-openid-proxy) -- This service provides authenticated access to a static website hosted in an s3 bucket. 157 | * [Config Conformance Packs](https://asecure.cloud/l/p_conformance_packs/) 158 | * [detect-secrets](https://github.com/Yelp/detect-secrets) -- An enterprise friendly way of detecting and preventing secrets in code. 159 | 160 | ### Non-CloudSec Stuff (TODO: move this elsewhere) 161 | * [proxify](https://github.com/projectdiscovery/proxify) -- Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. 162 | * [CloudFail](https://github.com/m0rtem/CloudFail) -- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network. 163 | * [chalice](https://github.com/aws/chalice) -- Python Serverless Microframework for AWS 164 | * [placebo](https://github.com/garnaat/placebo) -- Make boto3 calls that look real but have no effect. 165 | * [serverlessish](https://github.com/glassechidna/serverlessish) -- Run the same Docker images in AWS Lambda and AWS ECS 166 | * [BloodHound](https://github.com/BloodHoundAD/BloodHound) -- Six Degrees of Domain Admin 167 | * [ProcMon-for-Linux](https://github.com/Sysinternals/ProcMon-for-Linux) -- Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscall activity on the system. 168 | * [exec-template](https://github.com/groob/exec-template) -- Super simple go templater. 169 | * [leapp](https://github.com/Noovolari/leapp) -- Potential alternative to aws-vault 170 | --------------------------------------------------------------------------------