Security Operations for Aws

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Aws

Explore 39 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

s3reverse Logo

A format conversion tool for S3 buckets designed to assist bug bounty hunters and security testers in standardizing bucket data during reconnaissance activities.

0
AWSBucketDump Logo

A security tool for discovering and analyzing interesting files in AWS S3 buckets across multiple regions and bucket types.

0
ssm-acquire Logo

A Python module for orchestrating remote forensic data acquisition and analysis from Linux instances using Amazon SSM.

0
AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge Logo

An AWS incident response framework that uses Athena to analyze CloudTrail events and EventBridge for notifications to investigate API activity and detect security misconfigurations.

0
Redboto Logo

A Python-based red team toolkit that leverages AWS boto3 SDK to perform offensive operations including credential extraction and file exfiltration from EC2 instances.

0
barq Logo

A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.

0
Serverless Trap Honeyλ Logo

A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.

0
CloudCopy Logo

CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.

0
CloudFox Logo

CloudFox is an open source command line tool that helps penetration testers and offensive security professionals identify exploitable attack paths and gain situational awareness in cloud infrastructure environments.

0
SIFT Logo

SIFT is a digital forensics toolkit that provides installation management, task execution, and machine image building capabilities for forensic investigations on Ubuntu systems.

0
Pacu Logo

Pacu is an open-source AWS exploitation framework designed for offensive security testing against cloud environments through modular attack capabilities.

0
aws-summarize-account-activity Logo

A Python tool that analyzes AWS CloudTrail data to summarize IAM principal activities, API calls, regions, IP addresses, and user agents with configurable timeframes and visualization options.

0
AWS Security Automation Logo

A collection of AWS-native scripts and automation tools for DevSecOps, incident response, and security remediation in cloud environments.

0
MadKing Amazon Web Services Attack Platform Logo

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

0
BinaryAlert Logo

BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.

0
Simulator Logo

A distributed systems simulator that creates intentionally vulnerable Kubernetes clusters in AWS for security training and attack scenario practice.

0
Sadcloud Logo

A Terraform tool that creates intentionally misconfigured AWS infrastructure with 84 vulnerabilities across 22 services for security training and testing purposes.

0
Payloads All The Things Logo

A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.

0
Dionaea Honeypot on EC2 in 20 minutes Logo

A tutorial on setting up Dionaea on an EC2 instance in 20 minutes

0
CloudGoat Logo

CloudGoat is a vulnerable-by-design AWS deployment tool that creates intentionally insecure cloud environments for hands-on cybersecurity training through capture-the-flag scenarios.

0
Lambda-Proxy Logo

Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.

0
Cloud Forensics Utils Logo

A forensics toolkit for collecting digital evidence from Google Cloud Platform, Microsoft Azure, and Amazon Web Services during incident response investigations.

0
AWS IAM Privilege Escalation Methods Logo

Documentation of an AWS IAM privilege escalation technique that exploits the iam:CreatePolicyVersion permission to gain elevated access through policy manipulation.

0
AWS IR Logo

AWS IR is a Python command line utility for automated incident response and mitigation of instance and key compromises in Amazon Web Services environments.

0