You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1
Original file line number
Diff line number
Diff line change
@@ -178,6 +178,7 @@ And don't forget to **bookmark AWS Security bulletin** for new vulnerabilities n
178
178
18.[AWS Pentesting/Red Team Methodology - by hackingthe.cloud](https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/) - A collection of attacks/tactics/techniques that can use by offensive security professionals during cloud exploitation.
179
179
19.[CloudFox](https://github.com/BishopFox/cloudfox) - Automating situational awareness for cloud penetration tests
180
180
20.[aws-lint-iam-policies](https://github.com/welldone-cloud/aws-lint-iam-policies) - Tool to find problems in identity-based and resource-based IAM policies
181
+
21.[s3dns](https://github.com/olizimmermann/s3dns) - Passive DNS-based discovery of S3 (and other cloud) buckets by resolving CNAMEs and IPs during recon—ideal for stealthy and early identification of cloud storage exposures
181
182
182
183
## Security Practices and CTFs
183
184
1.[AWS Well Architected Security Labs](https://wellarchitectedlabs.com/security/)
0 commit comments