A collection of cloud security related resources
- Account of finding and expelling a cloud intruder
- Pen tester repot on how to identify attackers based on bearer token usage patterns
- PowerShell toolkit for attacking Azure
- Terraform script to setup your own compromised cloud cyber range
- Terraform framework for creating compromised cloud environments
- Service from Microsoft for managing multiple Tenants and Subscriptions through delegated access
- Origionally built by a team at Capital One