☁️
CTHFM: AWS
search
⌘Ctrlk
☁️
CTHFM: AWS
  • hand-waveWelcome
  • Getting Started
    • Account Setup
  • AWS CLI
    • AWS CLI Overview
    • Installation
  • AWS Fundamentals
    • AWS Documentation
    • AWS Shared Responsibility Model
    • Organizational Hierarchy
    • AWS Principals
    • IAM Fundamentals
    • AWS Security Services Overview
    • AWS Core Services
    • AWS Frameworks
    • Regions and Availability Zones
  • SQL
    • SQL Refresher for Threat Hunting
  • Logging Reference
    • Cloudtrail
    • VPCFlow Logs
    • GuardDuty
    • Access Analyzer
    • AWS Network Firewall
    • AWS Config
  • CloudWatch
    • Amazon CloudWatch
  • Athena For Threat Hunting
    • Introduction to Athena
    • Setting Up Athena
    • SQL For Threat Hunters
    • Automated Response
    • Query Best Practices
  • AWS Security Research and Resources
    • AWS Security Blog
    • AWS Goat
    • Cloud Goat
    • Pacu
    • Prowler
    • Scout Suite
  • Threat Hunting in AWS
    • Threat Hunting in AWS
    • Threat Hunting Introduction
    • Threat Hunting Process
    • Pyramid of Pain
    • MITRE Att&ck
    • MITRE Att&ck: AWS
    • AWS Threat Hunting Ideas
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. AWS Security Research and Resources

Cloud Goat

hashtag
Rhino Labs Cloud Goat

LogoGitHub - RhinoSecurityLabs/cloudgoat: CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment toolGitHubchevron-right
PreviousAWS Goatchevron-leftNextPacuchevron-right

Last updated 1 year ago