diff --git a/README.md b/README.md index 1e9a096..b88e743 100644 --- a/README.md +++ b/README.md @@ -17,6 +17,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea * [Books](#books) * [Malware Analysis Books](#malware-analysis-books) * [CTF Tools](#ctf-tools) +* [Cloud Platform Attack Tools](#cloud-platform-attack-tools) * [Collaboration Tools](#collaboration-tools) * [Conferences and Events](#conferences-and-events) * [Asia](#asia) @@ -163,6 +164,16 @@ See [awesome-malware-analysis § Books](https://github.com/rshipp/awesome-malwar * [ctf-tools](https://github.com/zardus/ctf-tools) - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines. * [shellpop](https://github.com/0x00-0x00/shellpop) - Easily generate sophisticated reverse or bind shell commands to help you save time during penetration tests. +## Cloud Platform Attack Tools + +See also *[HackingThe.cloud](https://hackingthe.cloud/)*. + +* [Cloud Container Attack Tool (CCAT)](https://rhinosecuritylabs.com/aws/cloud-container-attack-tool/) - Tool for testing security of container environments. +* [CloudHunter](https://github.com/belane/CloudHunter) - Looks for AWS, Azure and Google cloud storage buckets and lists permissions for vulnerable buckets. +* [Cloudsplaining](https://cloudsplaining.readthedocs.io/) - Identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. +* [Endgame](https://endgame.readthedocs.io/) - AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account. +* [GCPBucketBrute](https://github.com/RhinoSecurityLabs/GCPBucketBrute) - Script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated. + ## Collaboration Tools * [Dradis](https://dradisframework.com) - Open-source reporting and collaboration tool for IT security professionals.