Resources
| Name | CSP | Type | Notes |
|---|---|---|---|
| Pacu | AWS | Offensive / Exploitation framework | Modular AWS exploitation toolkit for post-compromise actions (priv escalation, token abuse, IAM attacks). (GitHub) |
| ScoutSuite | Multi-Cloud | Audit / Posture | Multi-cloud config & risk discovery (AWS/Azure/GCP). Good for mapping attack surface. (GitHub) |
| Prowler | Multi-Cloud (AWS-focused forks) | CIS/Hardening checks | CIS benchmark and security posture checks; useful in recon/auditing phases. (GitHub) |
| CloudSploit (Aqua) | Multi-Cloud | CSPM / scanning | Open-source cloud posture checks for misconfigurations. (GitHub) |
| Steampipe | Multi-Cloud | Live query / investigation | Query cloud APIs with SQL-like queries — great for rapid discovery & reporting. (GitHub) |
| TruffleHog / Gitleaks | Multi-Cloud | Secret-scanning | Repo/CI secret discovery to find leaked API keys, tokens. (jit.io) |
| CloudFox | AWS | Enumeration toolkit | BishopFox project for AWS recon and enumeration (you had this). |
| AWSGoat / AzureGoat / GCPGoat | AWS / Azure / GCP | Lab (vulnerable env) | Intentional “goat” environments for safe practice (you had these). |
| TryHackMe — Cloud rooms | Multi-Cloud | Labs / Learning | Guided hands-on cloud labs and learning paths. (TryHackMe) |
| GCpwn / GCPwn / awesome-gcp-pentesting | GCP | Offensive / Tool collections | GCP-focused offensive tools & curated collections for pentesting GCP. (clutchevents.co) |
| Kube-bench / Kube-hunter / Kubescape | Multi-Cloud (Kubernetes) | K8s scanners/pentest | Kubernetes CIS checks (kube-bench), vuln hunting (kube-hunter), misconfig scanning (kubescape). (GitHub) |
| Trivy / Clair / Grype | Multi-Cloud | Container image vuln scanning | Scan container images for CVEs and insecure packages; useful for container-hosted cloud apps. (Mattermost.com) |
| Terrascan / Checkov / KICS / Terratest | Multi-Cloud | IaC scanning | Static analysis for Terraform/CloudFormation to find insecure infra-as-code before deploy. |
| CloudGoat (INE) | Multi-Cloud | Lab (already in yours) | Intentionally vulnerable cloud environment for hands-on red-team practice. |
| NoJones / HackTricks / Hacking The Cloud | Multi-Cloud | Docs & wikis (you have these) | Excellent reference & cheat-sheet style material (you included). |
| MITRE ATT&CK — Cloud Matrix | Multi-Cloud | Threat model / techniques | Canonical mapping of cloud tactics/techniques — use for mapping findings to attacker behaviors. (MITRE ATT&CK) |
| Cloud CTFs / Clubs(CloudSecurity.club / CTFs) | Multi-Cloud | CTF / exercises | Capture-the-flag style labs focused on cloud IAM, metadata abuse, service accounts. (Medium) |
| Commercial / Managed: Lacework, Orca, CrowdStrike, Aqua | Multi-Cloud | CSPM / EDR / CNAPP | Commercial posture/EDR solutions — useful in enterprise engagements for detection context. |
| Research & Blogs: RhinoSecurity, NCC Group, NetSPI, Mandiant | Multi-Cloud | Research & writeups | Good sources for detailed attack techniques and escalation chains. (GitHub) |
https://github.com/BishopFox/cloudfox
https://www.nojones.net/cloud-security-resources
https://github.com/ine-labs/AWSGoat
https://owasp.org/www-chapter-singapore/assets/presos/AWSGoat_-_A_Damn_Vulnerable_AWS_Infrastructure.pdf
https://github.com/ine-labs/AzureGoat
https://github.com/ine-labs/GCPGoat
https://cloud.hacktricks.xyz/welcome/readme
https://hackingthe.cloud/
https://learn.microsoft.com/en-us/azure/security/fundamentals/pen-testing
https://www.brandloom.com/azure-penetration-testing
https://www.netspi.com/security-testing/azure-penetration-testing
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-architecture
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync/tutorial-basic-ad-azure
https://azure.microsoft.com/en-us/resources/securing-azure-environments-with-azure-active-directory/
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-architecture
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync/tutorial-basic-ad-azure
https://azure.microsoft.com/en-us/resources/securing-azure-environments-with-azure-active-directory/
[FREE] [OS + Tools] RedCloud OS
Pre-installed base tool sets for AWS, Azure, and GCP security testing on Parrot OS.
- Main 3 cloud providers CLIs or programmatic console access
- Additional Tools: 11 AWS, 15 Azure, 10 GCP, 16 Multi-cloud
- Full list of tools on their GitHub here: https://lnkd.in/eXEt3bHx