All Projects → cado-security → CloudAndContainerCompromiseSimulator

cado-security / CloudAndContainerCompromiseSimulator

Licence: Apache-2.0 license
Simulates a compromise in a cloud and container environment

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to CloudAndContainerCompromiseSimulator

awesome-cloud-native-security
awesome resources about cloud native security 🐿
Stars: ✭ 233 (+1065%)
Mutual labels:  cloud-security, kubernetes-security
sgCheckup
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+285%)
Mutual labels:  cloud-security
master-thesis
Выпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
Stars: ✭ 84 (+320%)
Mutual labels:  cloud-security
policy-server
Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
Stars: ✭ 111 (+455%)
Mutual labels:  kubernetes-security
awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+5180%)
Mutual labels:  cloud-security
awesome-kubernetes-security
A curated list of awesome Kubernetes security resources
Stars: ✭ 775 (+3775%)
Mutual labels:  kubernetes-security
Kube Bench
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
Stars: ✭ 4,359 (+21695%)
Mutual labels:  kubernetes-security
k0otkit
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: ✭ 217 (+985%)
Mutual labels:  kubernetes-security
Consoleme
A Central Control Plane for AWS Permissions and Access
Stars: ✭ 2,631 (+13055%)
Mutual labels:  cloud-security
Terrascan
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+13335%)
Mutual labels:  cloud-security
AriaCloud
A Docker container for remote penetration testing.
Stars: ✭ 105 (+425%)
Mutual labels:  cloud-security
Free Security Ebooks
Free Security and Hacking eBooks
Stars: ✭ 3,132 (+15560%)
Mutual labels:  cloud-security
metabadger
Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
Stars: ✭ 123 (+515%)
Mutual labels:  cloud-security
iamzero
Identity & Access Management simplified and secure.
Stars: ✭ 192 (+860%)
Mutual labels:  cloud-security
AWSXenos
AWSXenos will list all the trust relationships in all the IAM roles and S3 buckets
Stars: ✭ 57 (+185%)
Mutual labels:  cloud-security
Checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+17760%)
Mutual labels:  kubernetes-security
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+410%)
Mutual labels:  cloud-security
cdkgoat
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 27 (+35%)
Mutual labels:  cloud-security
tfquery
tfquery: Run SQL queries on your Terraform infrastructure. Query resources and analyze its configuration using a SQL-powered framework.
Stars: ✭ 297 (+1385%)
Mutual labels:  cloud-security
introspector
A schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+205%)
Mutual labels:  cloud-security

Background

This can be used an easy way of simulating a cloud and container compromise - to trigger detections

It is inspired by Florian Roth's APTSimulator

This allows you to trigger detections without running real world malware. Still, do not run this on production systems as it can reduce their security.

How to Run

Copy the files to a Linux system and run:

  • chmod +x ./setup.sh
  • ./setup.sh

You can also clone the repository directly, for example you can run on Amazon Linux like this:

Screenshot

Tools Deployed

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].