Home
Categories
πŸ”Ž
Osint
🎩
Brute-force
πŸ₯·
Active directory
πŸ“΅
Wireless security
🌩️
Cloud Security
🧩
Network assessment
πŸ•ΈοΈ
Web vulnerability detection
πŸ“Ά
Wireless Attacks
πŸ“
Information Gathering Tools
πŸ‘“
Sniffing & Spoofing
⚠️
Stress Testing
βš—οΈ
Forensics Tools
πŸ’«
Vulnerability Analysis
Tools
Blog
Tools

🌩️

Cloud Security

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore other tools categories:

πŸ”Ž
Osint
🎩
Brute-force
πŸ₯·
Active directory
πŸ“΅
Wireless security
🌩️
Cloud Security
🧩
Network assessment
πŸ•ΈοΈ
Web vulnerability detection
πŸ“Ά
Wireless Attacks
πŸ“
Information Gathering Tools
πŸ‘“
Sniffing & Spoofing
⚠️
Stress Testing
βš—οΈ
Forensics Tools
πŸ’«
Vulnerability Analysis
13.11.23

CloudHunter

CloudHunter is a potent reconnaissance tool for discovering and investigating security vulnerabilities in cloud storage buckets across providers. The tool's objective is to identify and display the permissions for potentially problematic buckets, giving users important information about the security of cloud storage setups.
October 2, 2023
13.11.23

CloudEnum

CloudEnum is a versatile multi-cloud OSINT (Open-source intelligence) tool designed to enumerate public resources in popular cloud service providers such as AWS (Amazon Web Services), Azure (Microsoft Azure), and Google Cloud Platform (GCP). This tool aids in discovering various resources within these cloud environments, providing valuable insights into potential security vulnerabilities.
October 2, 2023
13.11.23

barq

Barq is a post-exploitation framework designed to carry out assaults on a live Amazon infrastructure. Targeting live EC2 instances is made simpler by not requiring the original instance SSH keypairs.Additionally, AWS's secret and parameter storage may be listed and extracted using Barq.
October 3, 2023
13.11.23

BlobHunter

An open-source programme called BlobHunter is used to search Azure blob storage accounts for publicly available blobs. BlobHunter, a vital tool for locating improperly configured containers hosting sensitive data within Azure subscriptions, was created as a component of the "Hunting Azure Blobs Exposes Millions of SensitiveFiles" investigation.
October 3, 2023
13.11.23

CloudBrute

Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, and Linode are a few of the major cloud service providers. A powerful tool for identifying a company's (target) infrastructure, data, and software on these platforms is called CloudBrute. This tool is helpful for bug bounty hunters, red teams, and penetration testers who are trying to identify and assess cloud-based vulnerabilities.
October 3, 2023
13.11.23

CloudMapper

A useful tool for examining Amazon Web Services (AWS) infrastructures is called CloudMapper. CloudMapper currently supports a wide range of functions, including audits for security concerns. It was first developed for creating network diagrams. Although the network visualisation functionality (command prepare) is no longer supported, the tool is still developing and getting new capabilities.
October 3, 2023
13.11.23

Scout Suite

The open-source Scout Suite multi-cloud security auditing tool is intended to evaluate the security status of cloud systems. It collects configuration information from cloud providers using their open APIs, enabling security consultants and auditors to manually review systems and spot any security vulnerabilities. Scout Suite provides a clear, automated picture of the attack surface rather than browsing via online interfaces.
October 3, 2023
13.11.23

CloudFox

To assist penetration testers and offensive security specialists in becoming situationally aware in novel cloud environments, the open-source CloudFox command-line tool was developed. It assists in identifying weak attack vectors in cloud infrastructure by replying to several questions about the configuration and security posture of the cloud environment.
October 3, 2023
13.11.23

Pacu

AWS exploitation framework Pacu is open-source and developed for offensive security testing against cloud systems. Pacu, which Rhino Security Labs created and maintains, enables penetration testers to take advantage of configuration bugs in an AWS account. It uses modules to quickly increase the capability of its system, making a variety of attacks possible, such as user privilege escalation, IAM user backdooring, Lambda function exploitation, and others.
October 3, 2023
13.11.23

Prowler

Prowler is an open-source security tool made for doing assessments, audits, incident response, continuous monitoring, hardening, and forensics ready for AWS, GCP, and Azure security best practises.It has a large number of controls that cover many compliance frameworks, including ENS (Spanish National Security Scheme), CIS, NIST 800, NIST CSF, CISA, RBI, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, and AWS Well-Architected Framework Security Pillar.
October 3, 2023
13.11.23

CloudSploit

An open-source project called CloudSploit by Aqua enables the identification of security concerns in cloud infrastructure accounts, such as those for GitHub, Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Oracle Cloud Infrastructure (OCI). These programmes provide a long list of possible security flaws and setup errors.
October 3, 2023

Navigation

HomeTools

Services by CQR

Penetration Testing
Social Engineering
OSINT Recon
Vulnerability Assessment
Automotive Penetration Testing
DevSecOps
Smart Contract Audit
Incident Response
SOC Services
Risk Assessment
API Penetration Testing
Active Directory Audit
Fuzz Testing
Security Code Review
NOC Service
Forensics
Reverse Engineering

Related Posts

OSINT Recon: what is open source inteligence

October 2, 2023

Explore Tools Categories

πŸ”Ž

Osint

🎩

Brute-force

πŸ₯·

Active directory

πŸ“΅

Wireless security

🌩️

Cloud Security

🧩

Network assessment

πŸ•ΈοΈ

Web vulnerability detection

πŸ“Ά

Wireless Attacks

πŸ“

Information Gathering Tools

πŸ‘“

Sniffing & Spoofing

⚠️

Stress Testing

βš—οΈ

Forensics Tools

πŸ’«

Vulnerability Analysis

Tools