CloudCopy
Cloud attack tool
A tool that enables unauthorized access to domain controllers in the cloud by exploiting their snapshotting capabilities.
This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapshot permission.
120 stars
4 watching
21 forks
Language: Python
last commit: over 5 years ago
Linked from 1 awesome list
hacking-toolpython3redteam
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool for simulating attacks on cloud environments such as Azure and AWS | 378 |
| A tool to spider and search cloud resources like AWS, Azure, and Digital Ocean for potential vulnerabilities. | 506 |
| A platform for automating cloud security incident response and analysis | 182 |
| An application protection platform that monitors and analyzes cloud-native applications for vulnerabilities and threats. | 4,861 |
| A framework to simplify attack mapping and security modeling in software development | 46 |
| An introductory article on cloud security and development, covering various aspects of cloud computing, including infrastructure, storage, deployment, and security. | 536 |
| A tool for analyzing and visualizing Azure objects to help security teams understand potential attack surfaces. | 1,555 |
| Provides a tool to emulate offensive attack techniques in the cloud | 1,863 |
| A tool designed to detect security risks in cloud infrastructure accounts | 3,372 |
| A tool used to test DHCP IP exhaustion attacks by sending spoofed UDP requests to a DHCP server. | 668 |
| Automatically identifies and monitors cloud assets exposed to the internet without authorization | 332 |
| A tool designed to test the security of container environments by simulating various attacks and vulnerabilities. | 595 |
| A Python CLI tool for managing security and compliance in cloud and SaaS environments | 966 |
| A tool for identifying misconfigured CloudFront domains to prevent domain hijacking | 347 |
| An AWS deployment tool designed to provide intentionally vulnerable cloud infrastructure for hands-on learning and penetration testing. | 2,991 |