This repo contains a CLI tool to delete all resources. Cloud-nuke was created for situations when you might have an account you use for testing and need to clean up leftover resources so you're not charged for them. Also great for cleaning out accounts with redundant resources. Also great for removing unnecessary defaults like default VPCs and permissive ingress/egress rules in default security groups. In addition, cloud-nuke offers non-destructive inspecting functionality that can either be called via the command-line interface, or consumed as library methods, for scripting purposes. The currently supported functionality includes: AWS Cloud-nuke supports inspecting and deleting the following AWS resources: EC2 Auto scaling groups, EC2 Elastic Load Balancers (v1 and v2), EC2 EBS Volumes, EC2 Unprotected EC2 instances, EC2 AMIs, EC2 Snapshots, EC2 Elastic IPs, EC2 Launch Configurations, EC2 IPAM (Amazon VPC IP Address Manager), EC2 IPAM Pool, EC2 IPAM Scope, EC2 IPAM Custom Allocation, EC2 IPAM BYOASN, EC2 IPAM Resource Discovery, EC2 Internet Gateway, EC2 Network ACL, EC2 Egress only internet gateway, EC2 Endpoint, EC2 Security Group, EC2 Network Interf
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.
A set of tools for fingerprinting and exploiting Amazon cloud infrastructures
An open-source security tool for AWS, Azure, Google Cloud, and Kubernetes security assessments and audits.
Cloud security platform that provides configuration monitoring, compliance management, and security analysis across multi-cloud environments.
Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.
A tool to analyze and audit AWS environments for security issues and misconfigurations.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.